I'm a student in the XXXII Cycle (2016-2019) of PhD Study Course in Computer Science of the University of Salerno. My main research interests are in the following field:
My study course was focused on Computer Network with some low level study on Computer Security
Title of the thesis: Web Services Security
Advisor: Prof. Vincenzo Aulettae!
My study course was focused on Theoretical Computer Science studies, and in particular I focused my path on studying Algorithm Theory, Criptography and Computer and Network Security
Title of the thesis: "Privacy on Cloud Storage: A Duplication Based Approach"
Advisor: Prof.Giuseppr Persiano
In this work a distributed video surveillance system based on a Client-Server architecture is presented. The proposed system is accessible from portable devices such as tablets, smartphones, etc. In a typical real-world scenario, for example in homeland security, it is useful to have portable devices that can receive in real-time a frame or a sequence of frames coming from a selected camera to prevent or to detect attacks (i.e. terrorist attacks, etc.). In the proposed system, a portable device knows only the address of the server (repository), and the repository sends to the portable device the list of the clients (nodes) which are connected with one or more cameras. When the portable device obtains the list of the nodes, it connects directly to a specific node and requests the images of its connected cameras. The whole system provides secure communication channel between all its components. The security of both the node-repository and the repository-portable devices communications is guaranteed by using a secure connection. The security of the node-portable devices interconnection is provided by a digital invisible watermarking algorithm that affects each image before sending it from the node to the portable devices. Each portable device can extract the watermark and verify the identity of the node.
In this work we present a system for distributed video surveillance based on the Client-Server model. The system we present can be accessed via portable devices. In many real-world scenarios is useful, or sometimes necessary, to have portable devices that can receive real-time data from a selected camera, to prevent or to manage anomalous activities. The system provides reliable, high speed, secure and real-time communication among all its components, which are the Repository, the Node and the Portable Device. Both Repository and Node can act as a server. The Repository can provide services to both Nodes and Portable Devices, while the Nodes provide services only to the Portable Device. The portable device can only act as a client, using the services offered by the other two parts. In our system, a portable device is assumed to know only the location of the Repository which permits to get the list of nodes connected with one or more camera(s). When a portable device gets the list, it can choose which node intends to connect to, to get the images of its connected camera(s). The security of the interaction among Node-Repository and Node-Portable Device is guaranteed by using the SSL/TLS protocol. The interaction among nodes and portable devices is secured by using an invisible digital watermarking algorithm on each image, before that image is sent from a node to a portable device. The latter extracts the watermark from the image and verifies the identity of the node.
In this paper we discuss about video integrity problem and specifically we analyze whether the method proposed by Fridrich et al. can be exploited for forensic purposes. In particular Fridrich et al. proposed a solution to identify the source camera given an input image. The method relies on the Pixel Non-Uniformity (PNU) noise produced by the sensor and existing in any digital image.
We first present a wider scenario related to video integrity. Then we focus on a particular case of video forgery where sequences of frames, recorded by a different camera (in short, alien frames), could be added to the original video.
By means of experimental evaluation in specific real world forensic scenarios we analyzed the accuracy degree that this method can achieve and we evaluated the critical conditions where the results are not enough reliable to be considered in courts.
The results show that the method is robust, and alien frames can be reliably detected provided that the source device (or its faithful fingerprint) is available. Nevertheless the discussed method applies to a rather limited concept of video integrity (alien frames detection) and more extensive solutions, able to cover a wider range of application scenarios, would be required as well.
The AIR-GID project aim was to develop an integrated platform to collect data about patient affected by Type 2 Diabetes Mellito in all the campania region to improve the level of performance in treatement of this disease
My first duty was to analyze and improve the security of the company software.
I was in charge to analyze and manage all the new project for customization and configuration of niloAgent software in new customer. I was responsible for data collection, customer interview and production of analysis document as well as for the interaction with the software development area.
I was also in charge for the development of an Android app to interact and extract data from niloAgent managing all the development group.