Exportar 34 resultados:
[ Autor(Asc)] Título Tipo Año
Filtros: First Letter Of Last Name es C  [Elimina todos los filtros]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
V. Conotter, Comesaña, P., y Pérez-González, F., «Forensic detection of processing operator chains: recovering the history of filtered JPEG images», IEEE Transactions on Information Forensics and Security, 2015.Icono PDF tifs.pdf (2.46 MB)
V. Conotter, Comesaña, P., y Pérez-González, F., «Forensic analysis of full-frame linearly filtered JPEG images», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521.Icono PDF conotter.pdf (780.94 KB)
V. Conotter, Comesaña, P., y Pérez-González, F., «Joint detection of full-frame linear filtering and JPEG compression in digital images», in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013.Icono PDF wifs13_jpeg.pdf (1.02 MB)
P. Comesaña y Pérez-González, F., «Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools», in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012.Icono PDF iwdw12.pdf (326.11 KB)
P. Comesaña y Pérez-González, F., «The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.Archivo ieee-spl06_cropping.ps (243.75 KB)
P. Comesaña y Pérez-González, F., «Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007.Icono PDF jis07bows.pdf (436.69 KB)Archivo Source code available here. (8.51 MB)
P. Comesaña, Pérez-González, F., y Willems, F. M. J., «Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.Icono PDF spie05_dpc.pdf (165.56 KB)
P. Comesaña, Balado, F., y Pérez-González, F., «A Novel Interpretation of Content Authentication», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.Icono PDF spie07authentication.pdf (179.34 KB)
P. Comesaña, Pérez-González, F., y Abdallah, C. T., «Witsenhausen's counterexample and its links with multimedia security problems», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.Icono PDF iwdw11_witsenhausen.pdf (152.97 KB)
P. Comesaña y Pérez-González, F., «The optimal attack to histogram-based forensic detectors is simple(x)», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.Icono PDF wifs14.pdf (265.04 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.Archivo spie06_sensitivity.ps (1.62 MB)
P. Comesaña y Pérez-González, F., «Dither modulation in the logarithmic domain», in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.Icono PDF iwdw07.pdf (183.38 KB)
P. Comesaña y Pérez-González, F., «Optimal counterforensics for histogram-based forensics», in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052.Icono PDF icassp13.pdf (84.89 KB)Archivo Source code (5.47 MB)
P. Comesaña y Pérez-González, F., «Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.Archivo spie04.ps (572.73 KB)
P. Comesaña y Pérez-González, F., «Two different approaches for attacking BOWS», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.Icono PDF spie07bows.pdf (416.45 KB)
P. Comesaña y Pérez-González, F., «Weber's law-based side-informed data hiding», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.Icono PDF comesanaicassp11.pdf (119.42 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.Icono PDF iwdw05.pdf (190.47 KB)
P. Comesaña y Pérez-González, F., «On the capacity of stegosystems», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.Icono PDF acm07stego.pdf (198.41 KB)
P. Comesaña, Pérez-González, F., y Balado, F., «Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.Icono PDF icip03b.pdf (142.96 KB)
P. Comesaña, «Side-informed data hiding: robustness and security analysis», University of Vigo, Spain, 2006.Icono PDF thesis_pedro.pdf (2.18 MB)
P. Comesaña, Merhav, N., y Barni, M., «Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime», IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.Icono PDF tit-2010.pdf (240.81 KB)
P. Comesaña y Pérez-González, F., «Taking advantage of source correlation in forensic analysis», in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164.Icono PDF mmsp13.pdf (167.27 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.Icono PDF ih05_fundamentals.pdf (222.99 KB)
P. Comesaña y Pérez-González, F., «On a watermarking scheme in the logarithmic domain and its perceptual advantages», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.Icono PDF icip07logwat.pdf (77.03 KB)
P. Comesaña, «Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains», in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.Icono PDF wifs12_distinguishability.pdf (265.05 KB)