Solapas principales
«Forensics of high quality and nearly identical JPEG image recompression», in ACM Workshop on Information Hiding and Multimedia Security, 2016.
HQ_multipleJPEG.pdf (1.33 MB)
, 
«Image denoising in the encrypted domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016.
PTP16_WIFS16.pdf (527.76 KB)
, , , 
«Forensic detection of processing operator chains: recovering the history of filtered JPEG images», IEEE Transactions on Information Forensics and Security, 2015.
tifs.pdf (2.46 MB)
, 
«Multivariate Lattices for Encrypted Image Processing», in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015.
PedrouzoICASSP2015.pdf (348.56 KB)
, 
«An SVD Approach to Forensic Image Resampling Detection», in EUSIPCO, 2015, pp. 2112-2116.
eusipco15_dvazquez_pcomesan_fperez.pdf (169.61 KB)
, 
«Are you threatening me? Towards smart detectors in watermarking», in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
«A Benford-Fourier JPEG compression detector», in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014.
benford_icip_rice_new.pdf (235.58 KB)
, 
«Do dummies pay off? Limits of dummy traffic protection in anonymous communications», in Privacy Enhancing Technologies Symposium, 2014.
pets14.pdf (421.61 KB)
Matlab files used to perform the experiments in the paper. (5.55 KB)
, 

«Flat Fading Channel Estimation Based on Dirty Paper Coding», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014.
icassp14_gdc_pca_fpg.pdf (154.64 KB)
, 
«A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems», IEEE Transactions on Information Forensics and Security, 2014.
lsdaTIFS14.pdf (1.64 MB)
, 
«Multiple JPEG compression detection by means of Benford-Fourier coefficients», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
, «A New Look At ML Step-Size Estimation for Scalar Costa Scheme Data Hiding», in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014.
icip14.pdf (158.08 KB)
, 
«The optimal attack to histogram-based forensic detectors is simple(x)», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.
wifs14.pdf (265.04 KB)
, 
«Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior», 2014.
techrep.pdf (267.69 KB)
, 
«Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic», 2014.
trpets14.pdf (205.16 KB)
, 
«Technical Report UV/TSC/APU/02102014: Multivariate Ring Learning with Errors», University of Vigo, 2014.
TRMLWE2014.pdf (349.18 KB)
, 
«Transportation-theoretic image counterforensics to first significant digit histogram forensics», in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014.
cecilia_icassp2014.pdf (390.14 KB)
, 
«Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks», in IEEE Workshop on Information Forensics and Security, 2014.
wifs14.pdf (347.72 KB)
, 
«Coping with the enemy: Advances in adversary-aware signal processing», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, 2013, pp. 8682–8686.
, «The flow fingerprinting game», in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013, pp. 97–102.
wifs13_elices.pdf (534.58 KB)
, 
«Forensic analysis of full-frame linearly filtered JPEG images», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521.
conotter.pdf (780.94 KB)
, 
«Fully Private Noninteractive Face Verification», IEEE Transactions on Information Forensics and Security, vol. 8, n.º 7, pp. 1101-1114, 2013.
TPFJPGTIFS11-FullyPrivateFaceVerif.pdf (745.76 KB)
, 
«Joint detection of full-frame linear filtering and JPEG compression in digital images», in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013.
wifs13_jpeg.pdf (1.02 MB)
, 