SECURE! Security and management of crisis and emergencies.


SECURE! has been funded by Tuscany Region under the Programme POR-CReO 2007-2013 Linea d’intervento 1.5a-1.6 Bando Unico R&S Year 2012.

The project aims at studying how models, technologies and instruments, based on crowd-sourcing, can be applied to the prevention (when possible) and management (before, during and after) of events and emergency situations related to the public security.

The integration of information retrieved from mobile devices, social media and several type of sensors, suggests to exploit the online analysis of a large amount of data allowing to detect and identify dangerous events.


Such online approach enables the detection of critical situations as soon as they happen, so that a corresponding reaction can be successfully performed. Many application domains can benefit from this kind of analysis such as surveillance and protection of critical infrastructures and areas, for example: train stations, airports, public squares, world heritage protected areas in some cities of art and so on.

The process, starting from the data extraction, leads to the detection of the situation in progress. It introduces several challenges:

  • first of all, it should be highly efficient in order to handle a huge amount of data and detect the situation in progress before it is too late to perform the reaction successfully;
  • it should be also tolerant to different types of noise, meaning that the process should acknowledge only trusted information from trusted sources, otherwise it could lead to wrong scenario definitions and consequently wrong decisions;
  • it should be sufficiently reliable to trust the logged events, including architecture resilience and trustworthy data collection.
Secure! Framework
Secure! Framework

Complex Event Processing (CEP) systems are widely applied to manage streams of data, in different fields and applications, as business process management, financial services, and also security monitoring, especially for complex, large scale systems where large amounts of information is generated.

The Secure! Project exactly locates in such an application scenario. The project has studied and developed a service oriented infrastructure which, by resorting at diverse technological tools based on image forensics, source reputation analysis, Twitter message trend analysis, web source retrieval and crawling, and so on, provides an integrated event assessment especially regarding crisis management.


  • Irene Amerini, Lamberto Ballan,Roberto Caldelli, Alberto Del Bimbo, Luca Del Tongo, Giuseppe Serra, “Copy-Move Forgery Detection and Localization by Means of Robust Clustering with J-Linkage”. In Signal Processing: Image Communication, March 2013, vol. 28, no. 6, pp. 659-669
  • I.Amerini, M.Barni, R.Caldelli, A.Costanzo – SIFT keypoint removal and injection for countering matching-based Image Forensics, IH&MMSec13 ACM Information Hiding and Multimedia Security Workshop, 17-19 June 2013, Montpellier, France
  • I.Amerini, M.Barni, R.Caldelli, A.Costanzo, “Removal and injection of keypoints for SIFT-based copy-move counter-forensics”, EURASIP Journal on Information Security, 13/11/2013.
  • I.Amerini, R.Becarelli, R.Caldelli, A.Del Mastio Splicing Forgeries Localization through the Use of First Digit Features, IEEE Workshop on Information Forensics and Security at IEEE GlobalSIP , 3-5 December 2014, Atlanta (US)
  • I.Amerini, R.Caldelli, A.Del Bimbo, A.Di Fuccia, A.P.Rizzo, L.Saravo, Detection of manipulations on printed images to address crime scene analysis: A case study Forensic Science International, ISSN 0379-0738, Available online 30 March 2015.
  • I.Amerini, R.Caldelli, P.Crescenzi, A.Del Mastio, A.Marino, Blind image clustering based on the Normalized Cuts criterion for camera identification, Signal Processing: Image Communication, 23/09/2014.
  • I.Amerini, R.Caldelli, A.Del Bimbo, A.Di Fuccia, A.P.Rizzo, L.Saravo, Copy-Move Forgery Detection from Printed Images “, Proc. SPIE Electronic Imaging, San Francisco, CA US, february 2014.
  • A.Costanzo, I.Amerini, R.Caldelli, M.Barni, Forensic Analysis of SIFT Keypoint Removal and Injection IEEE Transactions on Information Forensics & Security, 12/09/2014.