Thanks to a number of developments in signal processing and communication technologies during the last three decades, even unskilled users can now create, store and transfer multimedia objects with astounding ease. Unfortunately, these advances have not only produced an explosion of pirate contents on the Internet, but are also jeopardizing our trust in digital contents, due to the availability of powerful editing tools. In the digital age, having an object is no longer owning it, as seeing is no longer believing. For the past 15 years, our group has been working on different solutions in the field of media security, including watermarking and, most recently, forensics. Our contributions have been published in the best conferences and journals of this area, and group members serve in editorial boards and technical committees.

Three European Projects (Certimark, NoE ECRYPT, and REWIND), as well as a number of regional and national projects, and industry contracts reflect the intense activity of the group in this field. During these years close collaboration with many research institutions has been established, most prominently with the Visual Information Processing and Protection Group (University of Siena), and the Stochastic Information Processing Group (University of Geneva).

Latest Publications

D. Vázquez-Padín, Pérez-González, F., and Comesaña, P., A Random Matrix Approach to the Forensic Analysis of Upscaled Images, IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115-2130, 2017.PDF icon TIFS17_resampling.pdf (1.04 MB)
A. Pedrouzo-Ulloa, Troncoso-Pastoriza, J. R., and Pérez-González, F., Number Theoretic Transforms for Secure Signal Processing, IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1125-1140, 2017.PDF icon PTP17_TIFS.pdf (651.54 KB)
S. Oya, Pérez-González, F., and Troncoso, C., Filter design for delay-based anonymous communications, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.PDF icon ICASSPmain.pdf (382.42 KB)
P. Comesaña and Pérez-González, F., The optimal attack to histogram-based forensic detectors is simple(x), in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.PDF icon wifs14.pdf (265.04 KB)