TY - CONF T1 - A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection T2 - EUSIPCO Y1 - 2022 A1 - Elena Rodríguez-Lois A1 - David Vázquez-Padín A1 - Fernando Pérez-González A1 - Pedro Comesaña KW - Convolutional Neural Networks KW - Double JPEG compression KW - Image forensics KW - Source heterogeneity AB -
Double JPEG compression detection has become a core issue in image forensics, as it provides information about the processing history of the image and its authenticity. Several recent works address this problem by exploiting the potential of CNNs  to achieve state-of-the-art performance on test datasets. Unfortunately, those schemes are typically tailored to their specific training conditions and suffer a significant drop of performance in real-life scenarios. This paper aims at assessing the influence of quantization table mismatch (with regards to those seen in training) in the detection of double JPEG compression. Experimental results show inconsistency between different sets of quantization tables, with trained models yielding significantly worse results on unknown sets. This effect is also evident in a more realistic setting, where it appears to be more noticeable for sources falling in operating regions with greater inconsistency.  
JF - EUSIPCO CY - Belgrade, Serbia ER - TY - JOUR T1 - A Random Matrix Approach to the Forensic Analysis of Upscaled Images JF - IEEE Transactions on Information Forensics and Security Y1 - 2017 A1 - David Vázquez-Padín A1 - Fernando Pérez-González A1 - Pedro Comesaña KW - Multimedia security KW - winter VL - 12 IS - 9 ER - TY - CONF T1 - Random Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling T2 - International Tyrrhenian Workshop on Digital Communication 2017 Y1 - 2017 A1 - David Vázquez-Padín A1 - Fernando Pérez-González A1 - Pedro Comesaña KW - Multimedia security KW - winter AB -

 The stochastic representation of digital images through a two-dimensional autoregressive (2D-AR) model offers a proper way to approximate the empirical distribution of the eigenvalues coming from genuine images. By considering this model, we apply random matrix theory to analytically derive the asymptotic eigenvalue distribution of causal 2D-AR random fields that have undergone an upscaling operation with a particular interpolation kernel. This eigenvalue characterization is useful in developing new forensic techniques for image resampling detection since we can use theoretical bounds to drive the decision of detectors based on subspace decomposition. Moreover, experimental results with real images show that the obtained asymptotic limits turn out to be excellent approximations, even when working with images of small size.

JF - International Tyrrhenian Workshop on Digital Communication 2017 PB - Springer International Publishing CY - Palermo, Italy ER - TY - JOUR T1 - Smart Detection of Line-Search Oracle Attacks JF - IEEE Transactions on Information Forensics and Security Y1 - 2017 A1 - Tondi, Benedetta A1 - Pedro Comesaña A1 - Fernando Pérez-González A1 - Barni, Mauro VL - 12 IS - 3 ER - TY - RPRT T1 - Technical Report UV-TSC-DVP-19042017: Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling Y1 - 2017 A1 - David Vázquez-Padín A1 - Fernando Pérez-González A1 - Pedro Comesaña PB - University of Vigo ER - TY - CONF T1 - Fast Sequential Forensic Detection of Camera Fingerprint T2 - IEEE International Conference on Image Processing (ICIP) Y1 - 2016 A1 - Fernando Pérez-González A1 - Miguel Masciopinto A1 - Iria González-Iglesias A1 - Pedro Comesaña JF - IEEE International Conference on Image Processing (ICIP) ER - TY - JOUR T1 - Forensic detection of processing operator chains: recovering the history of filtered JPEG images JF - IEEE Transactions on Information Forensics and Security Y1 - 2015 A1 - Valentina Conotter A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - compass KW - forensics U1 -

Accepted for publication.

ER - TY - CONF T1 - An SVD Approach to Forensic Image Resampling Detection T2 - EUSIPCO Y1 - 2015 A1 - David Vázquez-Padín A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - compass KW - digital image forensics KW - resampling detection KW - SVD KW - tampering detection AB -
This paper describes a new strategy for image resampling detection whenever the applied resampling factor is larger than one. Delving into the linear dependencies induced in an image after the application of an upsampling operation, we show that interpolated images belong to a subspace defined by the interpolation kernel. Within this framework, by computing the SVD of a given image block and a measure of its degree of saturated pixels per row/column, we derive a simple detector capable of discriminating between upsampled images and genuine images. Furthermore, the proposed detector shows remarkable results with blocks of small size and outperforms state-of-the-art methods.
JF - EUSIPCO ER - TY - CONF T1 - Are you threatening me? Towards smart detectors in watermarking T2 - Media Watermarking, Security, and Forensics Y1 - 2014 A1 - Mauro Barni A1 - Pedro Comesaña A1 - Fernando Pérez-González A1 - Benedetta Tondi KW - adversarial signal processing KW - watermarking JF - Media Watermarking, Security, and Forensics PB - SPIE CY - San Francisco, CA, USA ER - TY - CONF T1 - Flat Fading Channel Estimation Based on Dirty Paper Coding T2 - IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) Y1 - 2014 A1 - Gabriel Domínguez-Conde A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - channel estimation KW - dirty paper coding KW - dynacs KW - superimposed pilots AB -

A novel complex flat fading channel estimation scheme is proposed. Contrarily to previous schemes in the literature, this new approach is not based on introducing pilot sequences, but on reducing the  interference caused by the information-bearing signal on the estimation-aiding signal by using Dirty Paper Coding.  We show through simulations that our method outperforms the  Partially-Data Dependent scheme, which is a state-of-the-art technique based on superimposed pilots. 

JF - IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) CY - Florence, Italy ER - TY - CONF T1 - A New Look At ML Step-Size Estimation for Scalar Costa Scheme Data Hiding T2 - IEEE International Conference on Image Processing (ICIP) Y1 - 2014 A1 - Gabriel Domínguez-Conde A1 - Pedro Comesaña A1 - Fernando Pérez-González JF - IEEE International Conference on Image Processing (ICIP) CY - Paris, France ER - TY - CONF T1 - The optimal attack to histogram-based forensic detectors is simple(x) T2 - IEEE International Workshop on Information Forensics and Security (WIFS) Y1 - 2014 A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - compass KW - Multimedia security JF - IEEE International Workshop on Information Forensics and Security (WIFS) CY - Atlanta, GA U1 -

IEEE WIFS 2015 Best Paper Award

ER - TY - CONF T1 - Transportation-theoretic image counterforensics to first significant digit histogram forensics T2 - IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP) Y1 - 2014 A1 - Cecilia Pasquini A1 - Pedro Comesaña A1 - Fernando Pérez-González JF - IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP) PB - IEEE CY - Florence, Italy ER - TY - CONF T1 - Forensic analysis of full-frame linearly filtered JPEG images T2 - IEEE International Conference on Image Processing Y1 - 2013 A1 - Valentina Conotter A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - JPEG compression KW - linear filtering JF - IEEE International Conference on Image Processing CY - Melbourne, Australia ER - TY - CONF T1 - Joint detection of full-frame linear filtering and JPEG compression in digital images T2 - IEEE International Workshop on Information Forensics and Security Y1 - 2013 A1 - Valentina Conotter A1 - Pedro Comesaña A1 - Fernando Pérez-González JF - IEEE International Workshop on Information Forensics and Security PB - IEEE CY - Guangzhou, China ER - TY - CONF T1 - Optimal counterforensics for histogram-based forensics T2 - IEEE International Conference on Audio, Speech and Signal Processing Y1 - 2013 A1 - Pedro Comesaña A1 - Fernando Pérez-González JF - IEEE International Conference on Audio, Speech and Signal Processing PB - IEEE CY - Vancouver, Canada ER - TY - CONF T1 - Quantization lattice estimation for multimedia forensics T2 - IEEE International Conference on Image Processing Y1 - 2013 A1 - Pedro Comesaña A1 - Fernando Pérez-González A1 - Noelia Liste KW - Dual lattice KW - lattice estimation KW - multimedia forensics KW - noisy estimation JF - IEEE International Conference on Image Processing CY - Melbourne, Australia ER - TY - CONF T1 - Set-Membership Identification of Resampled Signals T2 - IEEE International Workshop on Information Forensics and Security (WIFS) Y1 - 2013 A1 - David Vázquez-Padín A1 - Pedro Comesaña A1 - Fernando Pérez-González AB -

The problem of resampling factor estimation as a means for tampering detection has been largely investigated. Most of the existing techniques rely on the analysis of cyclic correlations induced in the resampled signal. However, in this paper, a new direction is explored by addressing the same problem in terms of the set-membership estimation theory. The proposed technique constructs a model of the problem using available a priori knowledge and in consonance with a finite number of observations that comes from the resampled signal under study. With this information, the proposed technique is able to provide an estimate of the resampling factor applied to the original signal and, if required, an estimate of such signal and an estimate of the interpolation filter. The performance in terms of accuracy and MSE of the proposed approach is evaluated and comparative results with state-of-the-art methods are reported.

 
JF - IEEE International Workshop on Information Forensics and Security (WIFS) CY - Guangzhou, China ER - TY - CONF T1 - Taking advantage of source correlation in forensic analysis T2 - IEEE International Workshop on Multimedia Signal Processing Y1 - 2013 A1 - Pedro Comesaña A1 - Fernando Pérez-González JF - IEEE International Workshop on Multimedia Signal Processing CY - Pula (Sardinia), Italy ER - TY - CONF T1 - Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains T2 - IEEE Workshop on Information Forensics and Security Y1 - 2012 A1 - Pedro Comesaña JF - IEEE Workshop on Information Forensics and Security PB - IEEE CY - Tenerife, Spain ER - TY - CONF T1 - Detection of video double encoding with GOP size estimation T2 - IEEE International Workshop on Information Forensics and Security (WIFS) Y1 - 2012 A1 - David Vázquez-Padín A1 - Marco Fontani A1 - Tiziano Bianchi A1 - Pedro Comesaña A1 - Alessandro Piva A1 - Mauro Barni AB -

Video forensics is an emerging discipline, that aims at inferring information about the processing history undergone by a digital video in a blind fashion. In this work we introduce a new forensic footprint and, based on it, propose a method for detecting whether a video has been encoded twice; if this is the case, we also estimate the size of the Group Of Pictures (GOP) employed during the first encoding. As shown in the experiments, the footprint proves to be very robust even in realistic settings (i.e., when encoding is carried out using typical compression rates), that are rarely addressed by existing techniques.

JF - IEEE International Workshop on Information Forensics and Security (WIFS) PB - IEEE CY - Tenerife, Spain ER - TY - CONF T1 - IPTV streaming source classification T2 - IEEE Workshop on Information Forensics and Security Y1 - 2012 A1 - Miguel Masciopinto A1 - Pedro Comesaña JF - IEEE Workshop on Information Forensics and Security CY - Tenerife, Spain ER - TY - CONF T1 - ML Estimation of the Resampling Factor T2 - IEEE International Workshop on Information Forensics and Security (WIFS) Y1 - 2012 A1 - David Vázquez-Padín A1 - Pedro Comesaña AB -

In this work, the problem of resampling factor estimation for tampering detection is addressed following the maximum likelihood criterion. By relying on the rounding operation applied after resampling, an approximation of the likelihood function of the quantized resampled signal is obtained. From the underlying statistical model, the maximum likelihood estimate is derived for one-dimensional signals and a piecewise linear interpolation. The performance of the obtained estimator is evaluated, showing that it outperforms state-of-the-art methods.

JF - IEEE International Workshop on Information Forensics and Security (WIFS) PB - IEEE CY - Tenerife, Spain ER - TY - CONF T1 - Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools T2 - International Workshop on Digital-forensics and Watermarking Y1 - 2012 A1 - Pedro Comesaña A1 - Fernando Pérez-González JF - International Workshop on Digital-forensics and Watermarking CY - Shanghai, China ER - TY - CONF T1 - A new method for perspective correction of document images T2 - Document Recognition and Retrieval Y1 - 2011 A1 - José Rodríguez-Piñeiro A1 - Pedro Comesaña A1 - Fernando Pérez-González A1 - Alberto Malvido KW - Document image KW - perspective distortion correction KW - watermarking JF - Document Recognition and Retrieval T3 - Proc. of SPIE PB - SPIE CY - San Francisco, CA VL - 7874 ER - TY - CONF T1 - Weber's law-based side-informed data hiding T2 - IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) Y1 - 2011 A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - data hiding KW - Logarithmic watermarking KW - Perceptually shaped watermarks KW - watermarking KW - Weber's law JF - IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) CY - Prague, Czech Republic ER - TY - CONF T1 - Witsenhausen's counterexample and its links with multimedia security problems T2 - International Workshop on Digital Watermarking (IWDW) Y1 - 2011 A1 - Pedro Comesaña A1 - Fernando Pérez-González A1 - Chaouki T. Abdallah KW - control KW - Multimedia security KW - Witsenhausen's counterexample JF - International Workshop on Digital Watermarking (IWDW) CY - Atlantic City, USA ER - TY - JOUR T1 - Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime JF - IEEE Transactions on Information Theory Y1 - 2010 A1 - Pedro Comesaña A1 - Neri Merhav A1 - Mauro Barni KW - hypothesis testing KW - Neyman-Pearson KW - watermark detection KW - watermark embedding KW - watermarking VL - 56 ER - TY - CONF T1 - Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method T2 - IEEE International Conference on Image Processing (ICIP) Y1 - 2009 A1 - Gabriel Domínguez-Conde A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - cryptography KW - error statistics KW - false negative probabilities KW - false positive probabilities KW - Fridrich-Goljan self-embedding authentication method KW - hash bit errors KW - image authentication method KW - image coding KW - message authentication KW - performance analysis KW - robust hashing KW - watermarking JF - IEEE International Conference on Image Processing (ICIP) CY - Cairo, Egypt ER - TY - JOUR T1 - Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method JF - IEEE Transactions on Information Forensics and Security Y1 - 2009 A1 - Gabriel Domínguez-Conde A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - cryptography KW - error statistics KW - false negative probabilities KW - false positive probabilities KW - Fridrich-Goljan self-embedding authentication method KW - hash bit errors KW - image authentication method KW - image coding KW - message authentication KW - performance analysis KW - robust hashing KW - watermarking VL - 4 ER - TY - CONF T1 - Secure Direct and Iterative Protocols for Solving Systems of Linear Equations T2 - Signal Processing in the Encrypted Domain (SPEED) Workshop Y1 - 2009 A1 - Juan Ramón Troncoso-Pastoriza A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - iterative protocol KW - privacy KW - security KW - systems of linear equations KW - watermarking JF - Signal Processing in the Encrypted Domain (SPEED) Workshop CY - Lausanne, Switzerland ER - TY - CONF T1 - Videosurveillance and privacy: covering the two sides of the mirror with DRM T2 - ACM Workshop on Digital Rights Management (DRM) Y1 - 2009 A1 - Juan Ramón Troncoso-Pastoriza A1 - Pedro Comesaña A1 - Luis Pérez-Freire A1 - Fernando Pérez-González KW - access control KW - privacy KW - rights management KW - security KW - videosurveillance KW - watermarking JF - ACM Workshop on Digital Rights Management (DRM) PB - ACM CY - Chicago, IL, USA ER - TY - CONF T1 - Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks T2 - Security, Steganography, and Watermarking of Multimedia Contents Y1 - 2008 A1 - Pedro Comesaña A1 - Neri Merhav A1 - Mauro Barni ED - Edward J. Delp ED - Ping W. Wong ED - Jana Dittmann ED - Nasir D. Memon JF - Security, Steganography, and Watermarking of Multimedia Contents T3 - Proc. of SPIE PB - SPIE CY - San Jose, CA, USA VL - 6819 ER - TY - JOUR T1 - Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks JF - EURASIP Journal on Information Security Y1 - 2007 A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - data-hiding KW - oracle KW - sensitivity KW - watermarking VL - 2007 N1 - Vol 2007, Article ID 25308, 8 pages. doi:10.1155/2007/25308. Source code available here ER - TY - CONF T1 - On the capacity of stegosystems T2 - ACM Workshop on Multimedia and Security (MMSEC) Y1 - 2007 A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - data-hiding KW - steganography KW - watermarking JF - ACM Workshop on Multimedia and Security (MMSEC) CY - Dallas, TX, USA ER - TY - CONF T1 - Dither modulation in the logarithmic domain T2 - International Workshop on Digital Watermarking (IWDW) Y1 - 2007 A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - data-hiding KW - watermarking JF - International Workshop on Digital Watermarking (IWDW) CY - Guangzhou, China ER - TY - CONF T1 - Modeling Gabor coefficients via Generalized Gaussian Distributions for face recognition T2 - IEEE International Conference on Image Processing (ICIP) Y1 - 2007 A1 - Daniel González-Jiménez A1 - Fernando Pérez-González A1 - Pedro Comesaña A1 - Luis Pérez-Freire A1 - José Luis Alba-Castro KW - biometrics KW - face-recognition JF - IEEE International Conference on Image Processing (ICIP) CY - San Antonio, TX, USA ER - TY - CONF T1 - A Novel Interpretation of Content Authentication T2 - Security, Steganography, and Watermarking of Multimedia Contents Y1 - 2007 A1 - Pedro Comesaña A1 - Félix Balado A1 - Fernando Pérez-González ED - Edward J. Delp ED - Ping W. Wong KW - authentication KW - data-hiding KW - watermarking JF - Security, Steganography, and Watermarking of Multimedia Contents T3 - Proc. of SPIE PB - SPIE CY - San Jose, California, USA ER - TY - CONF T1 - Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking T2 - IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) Y1 - 2007 A1 - Mauro Barni A1 - Fernando Pérez-González A1 - Pedro Comesaña A1 - Guido Bartoli KW - data-hiding KW - watermarking JF - IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) CY - Honolulu, HW, USA VL - 4 ER - TY - CONF T1 - Two different approaches for attacking BOWS T2 - Security, Steganography, and Watermarking of Multimedia Contents Y1 - 2007 A1 - Pedro Comesaña A1 - Fernando Pérez-González ED - Edward J. Delp ED - Ping W. Wong KW - BOWS KW - data-hiding KW - sensitivity KW - watermarking JF - Security, Steganography, and Watermarking of Multimedia Contents T3 - Proc. of SPIE PB - SPIE CY - San Jose, California, USA ER - TY - CONF T1 - On a watermarking scheme in the logarithmic domain and its perceptual advantages T2 - IEEE International Conference on Image Processing (ICIP) Y1 - 2007 A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - data-hiding KW - watermarking JF - IEEE International Conference on Image Processing (ICIP) CY - San Antonio, TX, USA ER - TY - JOUR T1 - Blind Newton Sensitivity Attack JF - IEE Proceedings on Information Security Y1 - 2006 A1 - Pedro Comesaña A1 - Luis Pérez-Freire A1 - Fernando Pérez-González KW - data-hiding KW - watermarking VL - 153 N1 - To appear ER - TY - CONF T1 - The blind Newton senstivity attack T2 - Security, Steganography, and Watermarking of Multimedia Contents Y1 - 2006 A1 - Pedro Comesaña A1 - Luis Pérez-Freire A1 - Fernando Pérez-González ED - Edward J. Delp ED - Ping W. Wong KW - data-hiding KW - watermarking JF - Security, Steganography, and Watermarking of Multimedia Contents T3 - Proc. of SPIE PB - SPIE CY - San Jose, California, USA VL - 5306 ER - TY - JOUR T1 - On distortion-compensated Dither Modulation data-hiding with repetition coding JF - IEEE Transactions on Signal Processing Y1 - 2006 A1 - Pedro Comesaña A1 - Fernando Pérez-González A1 - Félix Balado KW - data-hiding KW - watermarking VL - 54 ER - TY - JOUR T1 - The impact of the cropping attack on scalar STDM data hiding JF - IEEE Signal Processing Letters Y1 - 2006 A1 - Pedro Comesaña A1 - Fernando Pérez-González KW - data-hiding KW - watermarking VL - 13 N1 - To appear ER - TY - CONF T1 - Secret dither estimation in lattice-quantization data hiding: a set-membership approach T2 - Security, Steganography, and Watermarking of Multimedia Contents Y1 - 2006 A1 - Luis Pérez-Freire A1 - Fernando Pérez-González A1 - Pedro Comesaña ED - Edward J. Delp ED - Ping W. Wong KW - data-hiding KW - security KW - watermarking JF - Security, Steganography, and Watermarking of Multimedia Contents T3 - Proc. of SPIE PB - SPIE CY - San Jose, California, USA VL - 5306 ER - TY - JOUR T1 - Security of lattice-based data hiding against the Known Message Attack JF - IEEE Transactions on Information Forensics and Security Y1 - 2006 A1 - Luis Pérez-Freire A1 - Fernando Pérez-González A1 - Teddy Furon A1 - Pedro Comesaña KW - data-hiding KW - security KW - watermarking VL - 1 ER - TY - THES T1 - Side-informed data hiding: robustness and security analysis Y1 - 2006 A1 - Pedro Comesaña KW - data-hiding KW - watermarking PB - University of Vigo, Spain ER - TY - JOUR T1 - Watermarking security: a survey JF - Transactions on Data Hiding and Multimedia Security I Y1 - 2006 A1 - Luis Pérez-Freire A1 - Pedro Comesaña A1 - Juan Ramón Troncoso-Pastoriza A1 - Fernando Pérez-González KW - data-hiding KW - security KW - watermarking VL - 4300 ER - TY - CONF T1 - Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding T2 - Security, Steganography, and Watermarking of Multimedia Contents Y1 - 2005 A1 - Pedro Comesaña A1 - Fernando Pérez-González A1 - Frans M. J. Willems ED - Edward J. Delp ED - Ping W. Wong KW - data-hiding KW - watermarking JF - Security, Steganography, and Watermarking of Multimedia Contents T3 - Proc. of SPIE PB - SPIE CY - San Jose, California, USA VL - 5306 ER - TY - CONF T1 - Detection in quantization-based watermarking: performance and security issues T2 - Security, Steganography, and Watermarking of Multimedia Contents Y1 - 2005 A1 - Luis Pérez-Freire A1 - Pedro Comesaña A1 - Fernando Pérez-González ED - Edward J. Delp ED - Ping W. Wong KW - data-hiding KW - security KW - watermarking JF - Security, Steganography, and Watermarking of Multimedia Contents T3 - Proc. of SPIE PB - SPIE CY - San Jose, California, USA VL - 5306 ER - TY - CONF T1 - Fundamentals of data hiding security and their application to spread-spectrum analysis T2 - International Workshop on Information Hiding (IH) Y1 - 2005 A1 - Pedro Comesaña A1 - Luis Pérez-Freire A1 - Fernando Pérez-González ED - Mauro Barni ED - Jordi Herrera-Joancomartí ED - Stefan Katzenbeisser ED - Fernando Pérez-González KW - data-hiding KW - watermarking JF - International Workshop on Information Hiding (IH) T3 - Lecture Notes in Computer Science PB - Springer-Verlag Heidelberg CY - Barcelona, Spain VL - 3727 ER - TY - CONF T1 - Information-theoretic analysis of security in side-informed data hiding T2 - International Workshop on Information Hiding (IH) Y1 - 2005 A1 - Luis Pérez-Freire A1 - Pedro Comesaña A1 - Fernando Pérez-González ED - Mauro Barni ED - Jordi Herrera-Joancomartí ED - Stefan Katzenbeisser ED - Fernando Pérez-González KW - data-hiding KW - security KW - watermarking JF - International Workshop on Information Hiding (IH) T3 - Lecture Notes in Computer Science PB - Springer-Verlag Heidelberg VL - 3727 N1 - 6-8 June ER - TY - CONF T1 - An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios T2 - International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) Y1 - 2005 A1 - Pedro Comesaña A1 - Luis Pérez-Freire A1 - Fernando Pérez-González KW - data-hiding KW - security KW - watermarking JF - International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) CY - Montreux, Switzerland ER - TY - CONF T1 - The return of the sensitivity attack T2 - International Workshop on Digital Watermarking (IWDW) Y1 - 2005 A1 - Pedro Comesaña A1 - Luis Pérez-Freire A1 - Fernando Pérez-González ED - Mauro Barni ED - Ingemar J. Cox ED - Ton Kalker ED - H. J. Kim KW - data-hiding KW - watermarking JF - International Workshop on Digital Watermarking (IWDW) T3 - Lecture Notes in Computer Science PB - Springer-Verlag Heidelberg CY - Siena, Italy VL - 3710 ER - TY - CONF T1 - On reversibility of random binning techniques: multimedia perspectives T2 - Conference on Communications and Multimedia Security (CMS) Y1 - 2005 A1 - Sviatoslav Voloshynovskiy A1 - Oleksiy Koval A1 - E. Topak A1 - Jose Emilio Vila-Forcén A1 - Pedro Comesaña A1 - Thierry Pun KW - data-hiding KW - watermarking JF - Conference on Communications and Multimedia Security (CMS) T3 - Lecture Notes in Computer Science PB - Springer-Verlag Heidelberg CY - Salzburg, Austria ER - TY - CONF T1 - Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm T2 - Security, Steganography, and Watermarking of Multimedia Contents Y1 - 2004 A1 - Félix Balado A1 - Fernando Pérez-González A1 - Pedro Comesaña ED - Edward J. Delp ED - Ping W. Wong KW - data-hiding KW - watermarking JF - Security, Steganography, and Watermarking of Multimedia Contents T3 - Proc. of SPIE PB - SPIE CY - San Jose, California, USA VL - 5306 ER - TY - CONF T1 - Improved Binary Dither-Modulation with perceptual constraints T2 - International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) Y1 - 2004 A1 - Fernando Pérez-González A1 - Pedro Comesaña KW - data-hiding KW - watermarking JF - International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) CY - Lisboa, Portugal ER - TY - CONF T1 - Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach T2 - Security, Steganography, and Watermarking of Multimedia Contents Y1 - 2004 A1 - Pedro Comesaña A1 - Fernando Pérez-González ED - Edward J. Delp ED - Ping W. Wong KW - data-hiding KW - watermarking JF - Security, Steganography, and Watermarking of Multimedia Contents T3 - Proc. of SPIE PB - SPIE CY - San Jose, California, USA VL - 5306 ER - TY - CONF T1 - Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks. T2 - IEEE International Conference on Image Processing (ICIP) Y1 - 2003 A1 - Fernando Pérez-González A1 - Pedro Comesaña A1 - Félix Balado KW - data-hiding KW - watermarking JF - IEEE International Conference on Image Processing (ICIP) PB - IEEE CY - Barcelona, Spain ER - TY - CONF T1 - Optimal Data-Hiding Strategies for Games with BER Payoffs T2 - International Workshop on Digital Watermarking (IWDW) Y1 - 2003 A1 - Pedro Comesaña A1 - Fernando Pérez-González A1 - Félix Balado ED - Ton Kalker ED - Ingemar J. Cox ED - Yong Man Ro KW - data-hiding KW - watermarking JF - International Workshop on Digital Watermarking (IWDW) T3 - Lecture Notes in Computer Science PB - Springer-Verlag Heidelberg VL - 2939 / 2004 ER - TY - CONF T1 - Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs T2 - IEEE International Conference on Image Processing (ICIP) Y1 - 2003 A1 - Pedro Comesaña A1 - Fernando Pérez-González A1 - Félix Balado KW - data-hiding KW - watermarking JF - IEEE International Conference on Image Processing (ICIP) PB - IEEE CY - Barcelona, Spain ER -