Exportar 513 resultados:
[ Autor(Desc)] Título Tipo Año
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
A. Casal, Serantes, C., González-Prelcic, N., y Pena, A. S., «Testing a Flexible Time-Frequency Mapping for High Frequencies in TARCO (Tonal Adaptive Resolution COdec)», in Audio Engineering Society Convention (AES Convention), Amsterdam, The Netherlands, 1998.
M. Caus, Pastore, A., Navarro, M., Ramírez, T., Mosquera, C., Noels, N., Alagha, N., y Perez-Neira, A. I., «Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems», in 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 2018.Icono PDF exploratory-analysis-superposition.pdf (288.42 KB)
D. Christopoulos, Arnau, J., Chatzinotas, S., Mosquera, C., y Ottersten, B., «MMSE Performance Analysis of Generalized Multibeam Satellite Channels», Communications Letters, IEEE, pp. 1-4, 2013.Icono PDF 1211.5903v1.pdf (192.05 KB)
P. Comesaña, «Side-informed data hiding: robustness and security analysis», University of Vigo, Spain, 2006.Icono PDF thesis_pedro.pdf (2.18 MB)
P. Comesaña, Merhav, N., y Barni, M., «Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.Icono PDF spie08one-bit-wm.pdf (277.85 KB)
P. Comesaña, Pérez-González, F., y Liste, N., «Quantization lattice estimation for multimedia forensics», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.Icono PDF icip13.pdf (88.9 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.Icono PDF iwdw05.pdf (190.47 KB)
P. Comesaña, Pérez-González, F., y Abdallah, C. T., «Witsenhausen's counterexample and its links with multimedia security problems», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.Icono PDF iwdw11_witsenhausen.pdf (152.97 KB)
P. Comesaña y Pérez-González, F., «Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.Archivo spie04.ps (572.73 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.Archivo iee-06bnsa.ps (1.67 MB)
P. Comesaña y Pérez-González, F., «Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007.Icono PDF jis07bows.pdf (436.69 KB)Archivo Source code available here. (8.51 MB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.Icono PDF ih05_fundamentals.pdf (222.99 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.Icono PDF wiamis05.pdf (119.47 KB)
P. Comesaña y Pérez-González, F., «Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools», in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012.Icono PDF iwdw12.pdf (326.11 KB)
P. Comesaña, Pérez-González, F., y Balado, F., «Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.Icono PDF icip03b.pdf (142.96 KB)
P. Comesaña y Pérez-González, F., «The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.Archivo ieee-spl06_cropping.ps (243.75 KB)
P. Comesaña y Pérez-González, F., «Dither modulation in the logarithmic domain», in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.Icono PDF iwdw07.pdf (183.38 KB)
P. Comesaña, Pérez-González, F., y Balado, F., «On distortion-compensated Dither Modulation data-hiding with repetition coding», IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.Icono PDF dcdm_uvigo05.pdf (311.95 KB)
P. Comesaña, Balado, F., y Pérez-González, F., «A Novel Interpretation of Content Authentication», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.Icono PDF spie07authentication.pdf (179.34 KB)
P. Comesaña y Pérez-González, F., «Weber's law-based side-informed data hiding», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.Icono PDF comesanaicassp11.pdf (119.42 KB)
P. Comesaña, Pérez-González, F., y Balado, F., «Optimal Data-Hiding Strategies for Games with BER Payoffs», in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.Archivo iwdw03.ps (499.03 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.Archivo spie06_sensitivity.ps (1.62 MB)
P. Comesaña y Pérez-González, F., «The optimal attack to histogram-based forensic detectors is simple(x)», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.Icono PDF wifs14.pdf (265.04 KB)