Solapas principales
«Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_dpc.pdf (165.56 KB)
, «Detection in quantization-based watermarking: performance and security issues», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, «Ensuring Gain Invariance in High-Rate Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, «Information-theoretic analysis of security in side-informed data hiding», in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145. ih05_sideinformed.pdf (218.44 KB)
, «Information-theoretic analysis of security in side-informed data hiding», in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145. ih05_sideinformed.pdf (218.44 KB)
, «An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005. wiamis05.pdf (119.47 KB)
, «Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks», IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Spread-spectrum vs. quantization-based data hiding: misconceptions and implications», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Worst case additive attack against quantization-based data-hiding methods», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Bias analysis and removal of a microphone array based road traffic speed estimator», in European Signal Processing Conference (EUSIPCO), Vienna, Austria, 2004. biasanalysis.pdf (106.81 KB)
, «Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815. spie04em.pdf (434.03 KB)
, «Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, «Estimation of road vehicle speed using two omnidirectional microphones: a maximum likelihood approach», EURASIP Journal of Applied Signal Processing, vol. 2004, pp. 1059–1077, 2004. regular.406.pdf (736.38 KB)
, «Improved Binary Dither-Modulation with perceptual constraints», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, Portugal, 2004. wiamis04_dm.ps (268.36 KB)
, «Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601. spie04.ps (572.73 KB)
, «Quantization-based watermarking performance improvement using host statistics: additive noise attack», in ACM Workshop on Multimedia and Security (MMSEC), Magdeburg, Germany, 2004.
, «Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, «Revealing the true achievable rates of Scalar Costa Scheme», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 203-206.
, «Spread Spectrum Watermarking for Real Images: Is Everything So Hopeless?», in European Signal Processing Conference (EUSIPCO), Vienna, Austria, 2004.
, «Worst case additive attack against quantization-based watermarking techniques», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
, «Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03a.pdf (145.04 KB)
,