Year of Publication: 2009
“Worst case attacks against binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50. ,
“EM decoding of Tardos traitor tracing codes”, in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009. ,
“Estimating the minimal length of Tardos code”, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009. ,
“Multiantenna detection of multicarrier primary signals exploiting spectral a priori information”, in International Conference on Cognitive Radio Oriented Wireless Networks and Communications (Crowncom), Hannover, Germany, 2009. ,
“Skewed Log-Stable model for natural images pixel block-variance”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009. ,
“Wideband Spectrum Sensing in Cognitive Radio: Joint Estimation of Noise Variance and Multiple Signal Levels”, in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Perugia, Italy, 2009. ,
“Videosurveillance and privacy: covering the two sides of the mirror with DRM”, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009. drm18-troncoso.pdf (417.17 KB) ,
“Secure Direct and Iterative Protocols for Solving Systems of Linear Equations”, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141. secure_sle_speedws09.pdf (193.97 KB) ,
“Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009. icip09domcomper.pdf (129.76 KB) ,
“Blind decoder for binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60. ,