Solapas principales
«Technical Report: MPEG-2 Prediction Residue Analysis», University of Vigo, 2019.
TR19.pdf (501.11 KB)
, 
«Camera Attribution Forensic Analyzer in the Encrypted Domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018.
PMTP18_WIFS18.pdf (655.48 KB)
, 
«Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals», in European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018.
Eusipco18_Masciopinto_PerezGonzalez.pdf (600.61 KB)
, 
«Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms», in ACM Conference on Computer and Communications Security (CCS), 2017.
CCSmain.pdf (1.82 MB)
, 
«Design of projection matrices for PRNU compression», in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.
2017_prnu_projection.pdf (689.14 KB)
, 
«Filter design for delay-based anonymous communications», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
ICASSPmain.pdf (382.42 KB)
, 
«Is Geo-Indistinguishability what you are looking for?», in Workshop on Privacy in the Electronic Society (WPES), 2017.
1709.06318.pdf (822.66 KB)
, 
«Number Theoretic Transforms for Secure Signal Processing», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 5, pp. 1125-1140, 2017.
PTP17_TIFS.pdf (651.54 KB)
, 
«A Random Matrix Approach to the Forensic Analysis of Upscaled Images», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 9, pp. 2115-2130, 2017.
TIFS17_resampling.pdf (1.04 MB)
, 
«Random Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling», in International Tyrrhenian Workshop on Digital Communication 2017, Palermo, Italy, 2017, pp. 109-124.
TIWDC17_dvazquez_fperez_pcomesan.pdf (394.61 KB)
, 
«Secure Genomic Susceptibility Testing based on Lattice Encryption», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017.
TPP17_ICASSP17.pdf (403.53 KB)
, 
«Smart Detection of Line-Search Oracle Attacks», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 3, pp. 588-603, 2017.
TIFS_smartOracle.pdf (3.73 MB)
, 
«Statistical detection of JPEG traces in digital images in uncompressed formats», IEEE Transactions on Information Forensics and Security, vol. 12, n.º Pending, 2017.
TIFSbenford.pdf (5.94 MB)
, , 
«Data Hiding Robust to Mobile Communication Vocoders», IEEE Transactions on Multimedia, vol. 18, n.º 12, pp. 2345-2357, 2016.
TMM2599149.pdf (3.04 MB)
, 
«Design of pool mixes against profiling attacks in real conditions», IEEE/ACM Transactions on Networking, vol. 24, n.º 6, pp. 3662-3675, 2016.
TNET2547391_author_version.pdf (1.96 MB)
, 
«Dynamic Privacy-Preserving Genomic Susceptibility Testing», in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50.
IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, 
«Fast Sequential Forensic Detection of Camera Fingerprint», in IEEE International Conference on Image Processing (ICIP), 2016.
perez.pdf (325.29 KB)
, 
«Forensics of high quality and nearly identical JPEG image recompression», in ACM Workshop on Information Hiding and Multimedia Security, 2016.
HQ_multipleJPEG.pdf (1.33 MB)
, 
«Image denoising in the encrypted domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016.
PTP16_WIFS16.pdf (527.76 KB)
, , , 
«Forensic detection of processing operator chains: recovering the history of filtered JPEG images», IEEE Transactions on Information Forensics and Security, 2015.
tifs.pdf (2.46 MB)
, 
«Multivariate Lattices for Encrypted Image Processing», in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015.
PedrouzoICASSP2015.pdf (348.56 KB)
, 
«An SVD Approach to Forensic Image Resampling Detection», in EUSIPCO, 2015, pp. 2112-2116.
eusipco15_dvazquez_pcomesan_fperez.pdf (169.61 KB)
, 