Year of Publication: 2006
“Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation”, International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006. ,
“Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB) ,
“An accurate analysis of scalar quantization-based data-hiding”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006. ,
“Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB) ,
Year of Publication: 2005
“Realizable minimum mean-squared error channel shorteners”, IEEE Transactions on Signal Processing, vol. 53, pp. 4354–4362, 2005. T_SP_02192_2004.pdf (149.65 KB) ,
“Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005. ,
Year of Publication: 2004
“Blind input, initial state, and system identification of SIMO Laguerre systems”, IEEE Transactions on Signal Processing, vol. 52, pp. 3357–3369, 2004. ,
“Realizable linear and decision feedback equalizers: properties and connections”, IEEE Transactions on Signal Processing, vol. 52, pp. 757–773, 2004. ,
“Cost minimisation interpretation of fourth power phase estimator and links to multimodulus algorithm”, IEE Electronics Letters, vol. 40, pp. 278–279, 2004. fourthpower.pdf (52.6 KB) ,
“Estimation of road vehicle speed using two omnidirectional microphones: a maximum likelihood approach”, EURASIP Journal of Applied Signal Processing, vol. 2004, pp. 1059–1077, 2004. regular.406.pdf (736.38 KB) ,