Exportar 72 resultados:
[ Autor
Filtros: First Letter Of Last Name es P [Elimina todos los filtros]
«A Tutorial on Digital Watermarking», in IEEE Annual Carnahan Conference on Security Technology, Madrid, Spain, 1999.
, «High-rate quantization data hiding robust to arbitrary linear filtering attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, «A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems», IEEE Transactions on Information Forensics and Security, 2014.
lsdaTIFS14.pdf (1.64 MB)
, 
«Characterization and Algebraic Solution to the Extreme-Point Robust SPR Problem», in IFAC World Congress, San Francisco, CA, USA, 1996, pp. 391-396.
, «Improving Data Hiding Performance by Using Quantization in a Projected Domain», in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, «Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior», 2014.
techrep.pdf (267.69 KB)
, 
«Benford's Law in Image Processing», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007.
, «Fast Sequential Forensic Detection of Camera Fingerprint», in IEEE International Conference on Image Processing (ICIP), 2016.
perez.pdf (325.29 KB)
, 
«Least Squares Disclosure Attacks: User Profiling for Mix-based Anonymous Communication Systems», University of Vigo, Vigo, 2013.
lssda-main-tifs.pdf (516.78 KB)
, 
«Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, «Algebraic LTI Filter Synthesis for Simultaneously Making a Convex Combination of Discrete-Time Plants SPR», in IEEE Conference on Decision and Control (CDC), New Orleans, LA, 1995, pp. 780-781.
, «Quantized Projection Data Hiding», in IEEE International Conference on Image Processing (ICIP), Rochester (NY), USA, 2002.
, «A Least Squares approach to user profiling in pool mix-based anonymous communication systems.», in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 115–120.
wifs2012_pg.pdf (321.08 KB)
, 
«A Generalization of Benford's Law and Its Application to Images», in European Control Conference (ECC), Kos, Greece, 2007.
, «Misconvergence and stabilization of adaptive IIR lattice filters», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Istanbul, Turkey, 2000, vol. 1, pp. 65–68.
, «Improved Binary Dither-Modulation with perceptual constraints», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, Portugal, 2004.
wiamis04_dm.ps (268.36 KB)
, 
«Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels», IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, «Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation», in International Workshop on Information Hiding (IH), Noorwijkerhout, The Netherlands, 2002.
, «Understanding statistical disclosure: A least squares approach», in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57.
pets2012_fpg.pdf (450.58 KB)
, 
«Ensuring Gain Invariance in High-Rate Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Road vehicle speed estimation from a two-microphone array», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Orlando, FL, USA, 2002, vol. 2, pp. 1321–1324.
, «The Importance of aliasing in structured quantization index modulation data hiding (invited lecture)», in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 1-17.
, «Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications», Signal Processing, vol. 81, pp. 1215–1238, 2001.
, «Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks», IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, «PRNU-leaks: facts and remedies», in 2020 28th European Signal Processing Conference (EUSIPCO), Virtual Event Amsterdam, 2020.
,