«Two-Level Frame Precoding with non-Cooperative Gateways», EURASIP Journal on Wireless Communications and Networking, 2020. Two_Level_Frame_Precoding_with_non_Cooperative_Gateways.pdf (2.14 MB)
, «Detection of Rank-P Signals in Cognitive Radio Networks With Uncalibrated Multiple Antennas», IEEE Trans. on Signal Processing, vol. 59, n.º 8, pp. 3764-3774, 2011. manuscript.pdf (587.54 KB)
, «Model-based steganalysis using invariant features», in Media Forensics and Security, San Jose, CA, U.S.A., 2009.
, «Improved Binary Dither-Modulation with perceptual constraints», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, Portugal, 2004. wiamis04_dm.ps (268.36 KB)
, «Ensuring Gain Invariance in High-Rate Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Least Squares Disclosure Attacks: User Profiling for Mix-based Anonymous Communication Systems», University of Vigo, Vigo, 2013. lssda-main-tifs.pdf (516.78 KB)
, «Understanding statistical disclosure: A least squares approach», in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57. pets2012_fpg.pdf (450.58 KB)
, «The Importance of aliasing in structured quantization index modulation data hiding (invited lecture)», in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 1-17.
, «Misconvergence and stabilization of adaptive IIR lattice filters», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Istanbul, Turkey, 2000, vol. 1, pp. 65–68.
, «Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, «PRNU-leaks: facts and remedies», in 2020 28th European Signal Processing Conference (EUSIPCO), Virtual Event Amsterdam, 2020.
, «PRNU-leaks: facts and remedies», in 2020 28th European Signal Processing Conference (EUSIPCO), 2021, pp. 720-724.
, «Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation», in International Workshop on Information Hiding (IH), Noorwijkerhout, The Netherlands, 2002.
, «Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks», IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, «Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03a.pdf (145.04 KB)
, «Characterization and Algebraic Solution to the Extreme-Point Robust SPR Problem», in IFAC World Congress, San Francisco, CA, USA, 1996, pp. 391-396.
, «Road vehicle speed estimation from a two-microphone array», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Orlando, FL, USA, 2002, vol. 2, pp. 1321–1324.
, «Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications», Signal Processing, vol. 81, pp. 1215–1238, 2001.
, «High-rate quantization data hiding robust to arbitrary linear filtering attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, «Improving Data Hiding Performance by Using Quantization in a Projected Domain», in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, «Benford's Law in Image Processing», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007.
, «Algebraic LTI Filter Synthesis for Simultaneously Making a Convex Combination of Discrete-Time Plants SPR», in IEEE Conference on Decision and Control (CDC), New Orleans, LA, 1995, pp. 780-781.
, «Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, «Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior», 2014. techrep.pdf (267.69 KB)
, «A Generalization of Benford's Law and Its Application to Images», in European Control Conference (ECC), Kos, Greece, 2007.
,