«Analysis and Design of Multirate Synchronous Sampling Schemes for Sparse Multiband Signals», in European Signal Processing Conference (EUSIPCO 2012), 2012, pp. 1184-1188. elenanuriaeusipco2012.pdf (408.64 KB)
, «Flat Fading Channel Estimation Based on Dirty Paper Coding», University of Vigo, Vigo, 2016. thesis_gdomin.pdf (2.52 MB)
, «Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009. tifs09performanceanalysis.pdf (232.67 KB)
, «Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009. icip09domcomper.pdf (129.76 KB)
, «Improving the Visual Performance of S/DISCUS», in IEEE International Conference on Multimedia and Expo (ICME), Barcelona, Catalonia, 2011.
, «A New Look At ML Step-Size Estimation for Scalar Costa Scheme Data Hiding», in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014. icip14.pdf (158.08 KB)
, «Flat Fading Channel Estimation Based on Dirty Paper Coding», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. icassp14_gdc_pca_fpg.pdf (154.64 KB)
, «Interference cancellation and blind equalization for linear multi-user systems», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Istanbul, Turkey, 2000, vol. 1, pp. 145–148.
, «Joint Linear Precoding and Beamforming for the Forward Link of Multi-Beam Broadband Satellite Systems», in IEEE GLOBECOM, Houston, Texas, USA, 2011. devi1112_joint.pdf (143.58 KB)
, «Visible Encryption: Using Paper as a Secure Channel», in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, «On the Role of Differentiation for Resampling Detection», in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010.
, «Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks», vol. 22, n.º 12, p. 36, 2020.
, «Joint detection of full-frame linear filtering and JPEG compression in digital images», in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013. wifs13_jpeg.pdf (1.02 MB)
, «Forensic analysis of full-frame linearly filtered JPEG images», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521. conotter.pdf (780.94 KB)
, «Forensic detection of processing operator chains: recovering the history of filtered JPEG images», IEEE Transactions on Information Forensics and Security, 2015. tifs.pdf (2.46 MB)
, «Side-informed data hiding: robustness and security analysis», University of Vigo, Spain, 2006. thesis_pedro.pdf (2.18 MB)
, «Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819. spie08one-bit-wm.pdf (277.85 KB)
, «Quantization lattice estimation for multimedia forensics», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456. icip13.pdf (88.9 KB)
, «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, «Witsenhausen's counterexample and its links with multimedia security problems», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011. iwdw11_witsenhausen.pdf (152.97 KB)
, «Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601. spie04.ps (572.73 KB)
, «Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
, «Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007. jis07bows.pdf (436.69 KB) Source code available here. (8.51 MB)
, «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, «An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005. wiamis05.pdf (119.47 KB)
,