Exportar 110 resultados:
Autor Título Tipo [ Año
Filtros: Clave es watermarking [Elimina todos los filtros]
«Digital Watermarking Security», University of Vigo, Spain, 2008.
ThesisPerezFreire.pdf (4.79 MB)
, 
«Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, «Quantization-Based Methods: Additive Attacks Performance Analysis», Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, «Security of lattice-based data hiding against the Watermarked Only Attack», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, «Blind decoder for binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
, «EM decoding of Tardos traitor tracing codes», in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
, «Estimating the minimal length of Tardos code», in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
, «AN EXTENDED ANALYSIS OF DISCRETE FOURIER TRANFORM - RATIONAL DITHER MODULATION FOR NON-WHITE HOSTS», in IEEE International Workshop on Information Forensics and Security (WIFS), London, U.K., 2009.
, «High-rate data-hiding robust to linear filtering for colored hosts», EURASIP Journal on Information Security, 2009.
, «Modeling Magnitudes of Gabor Coefficients: The β-Rayleigh Distribution», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, «Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
icip09domcomper.pdf (129.76 KB)
, 
«Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.
tifs09performanceanalysis.pdf (232.67 KB)
, 
«Secure Direct and Iterative Protocols for Solving Systems of Linear Equations», in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.
secure_sle_speedws09.pdf (193.97 KB)
, 
«Skewed Log-Stable model for natural images pixel block-variance», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, «Spread spectrum watermarking security», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
, «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.
drm18-troncoso.pdf (417.17 KB)
, 
«Worst case attacks against binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
, «Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime», IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.
tit-2010.pdf (240.81 KB)
, 
«CryptoDSPs for Cloud Privacy», in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
, «Leaving Timing Channel Fingerprints in Hidden Service Log Files», Digital Investigation, 2010.
, «Leaving Timing Channel Fingerprints in Hidden Service Log Files», in Digital Forensic Research Workshop Annual Conference (DFRWS), Portland, Oregon, 2010.
, «A new model for Gabor Coefficients' Magnitude in Face Recognition», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, USA, 2010.
, «On the Role of Differentiation for Resampling Detection», in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010.
, «Secure and Private Medical Clouds using Encrypted Processing», in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, «Two-dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images», in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010, pp. 1745-1748.
icip2010_dvazquez_cmosquera_fperez.pdf (1.32 MB)
, 