Exportar 235 resultados:
Autor Título Tipo [ Año] Filtros: Autor es Fernando Pérez-González [Elimina todos los filtros]
«Flat Fading Channel Estimation Based on Dirty Paper Coding», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. icassp14_gdc_pca_fpg.pdf (154.64 KB)
, «A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems», IEEE Transactions on Information Forensics and Security, 2014. lsdaTIFS14.pdf (1.64 MB)
, «Multiple JPEG compression detection by means of Benford-Fourier coefficients», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
, «A New Look At ML Step-Size Estimation for Scalar Costa Scheme Data Hiding», in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014. icip14.pdf (158.08 KB)
, «The optimal attack to histogram-based forensic detectors is simple(x)», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142. wifs14.pdf (265.04 KB)
, «Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior», 2014. techrep.pdf (267.69 KB)
, «Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic», 2014. trpets14.pdf (205.16 KB)
, «Technical Report UV/TSC/APU/02102014: Multivariate Ring Learning with Errors», University of Vigo, 2014. TRMLWE2014.pdf (349.18 KB)
, «Transportation-theoretic image counterforensics to first significant digit histogram forensics», in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. cecilia_icassp2014.pdf (390.14 KB)
, «Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks», in IEEE Workshop on Information Forensics and Security, 2014. wifs14.pdf (347.72 KB)
, «Forensic detection of processing operator chains: recovering the history of filtered JPEG images», IEEE Transactions on Information Forensics and Security, 2015. tifs.pdf (2.46 MB)
, «Multivariate Lattices for Encrypted Image Processing», in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015. PedrouzoICASSP2015.pdf (348.56 KB)
, «An SVD Approach to Forensic Image Resampling Detection», in EUSIPCO, 2015, pp. 2112-2116. eusipco15_dvazquez_pcomesan_fperez.pdf (169.61 KB)
, «Data Hiding Robust to Mobile Communication Vocoders», IEEE Transactions on Multimedia, vol. 18, n.º 12, pp. 2345-2357, 2016. TMM2599149.pdf (3.04 MB)
, «Design of pool mixes against profiling attacks in real conditions», IEEE/ACM Transactions on Networking, vol. 24, n.º 6, pp. 3662-3675, 2016. TNET2547391_author_version.pdf (1.96 MB)
, «Dynamic Privacy-Preserving Genomic Susceptibility Testing», in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50. IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, «Fast Sequential Forensic Detection of Camera Fingerprint», in IEEE International Conference on Image Processing (ICIP), 2016. perez.pdf (325.29 KB)
, «Forensics of high quality and nearly identical JPEG image recompression», in ACM Workshop on Information Hiding and Multimedia Security, 2016. HQ_multipleJPEG.pdf (1.33 MB)
, «Image denoising in the encrypted domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016. PTP16_WIFS16.pdf (527.76 KB)
, , , «Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms», in ACM Conference on Computer and Communications Security (CCS), 2017. CCSmain.pdf (1.82 MB)
, «Design of projection matrices for PRNU compression», in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6. 2017_prnu_projection.pdf (689.14 KB)
, «Filter design for delay-based anonymous communications», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017. ICASSPmain.pdf (382.42 KB)
, «Is Geo-Indistinguishability what you are looking for?», in Workshop on Privacy in the Electronic Society (WPES), 2017. 1709.06318.pdf (822.66 KB)
,