2011
J. R. Troncoso-Pastoriza y Pérez-González, F., «Secure Adaptive Filtering», IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011.Icono PDF TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
P. Comesaña y Pérez-González, F., «Weber's law-based side-informed data hiding», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.Icono PDF comesanaicassp11.pdf (119.42 KB)
P. Comesaña, Pérez-González, F., y Abdallah, C. T., «Witsenhausen's counterexample and its links with multimedia security problems», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.Icono PDF iwdw11_witsenhausen.pdf (152.97 KB)
2010
J. R. Troncoso-Pastoriza y Pérez-González, F., «CryptoDSPs for Cloud Privacy», in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
B. Shebaro, Pérez-González, F., y Crandall, J. R., «Leaving Timing Channel Fingerprints in Hidden Service Log Files», Digital Investigation, 2010.
B. Shebaro, Pérez-González, F., y Crandall, J. R., «Leaving Timing Channel Fingerprints in Hidden Service Log Files», in Digital Forensic Research Workshop Annual Conference (DFRWS), Portland, Oregon, 2010.
J. R. Troncoso-Pastoriza, González-Jiménez, D., y Pérez-González, F., «A new model for Gabor Coefficients' Magnitude in Face Recognition», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, USA, 2010.
N. Dalgaard, Mosquera, C., y Pérez-González, F., «On the Role of Differentiation for Resampling Detection», in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010.
J. R. Troncoso-Pastoriza y Pérez-González, F., «Secure and Private Medical Clouds using Encrypted Processing», in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
D. Vázquez-Padín, Mosquera, C., y Pérez-González, F., «Two-dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images», in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010, pp. 1745-1748.Icono PDF icip2010_dvazquez_cmosquera_fperez.pdf (1.32 MB)
2009
M. Scagliola, Pérez-González, F., y Guccione, P., «AN EXTENDED ANALYSIS OF DISCRETE FOURIER TRANFORM - RATIONAL DITHER MODULATION FOR NON-WHITE HOSTS», in IEEE International Workshop on Information Forensics and Security (WIFS), London, U.K., 2009.
M. Scagliola, Pérez-González, F., y Guccione, P., «High-rate data-hiding robust to linear filtering for colored hosts», EURASIP Journal on Information Security, 2009.
T. - T. Quach, Pérez-González, F., y Heileman, G. L., «Model-based steganalysis using invariant features», in Media Forensics and Security, San Jose, CA, U.S.A., 2009.
D. González-Jiménez, Argones-Rúa, E., Pérez-González, F., y Alba-Castro, J. L., «Modeling Magnitudes of Gabor Coefficients: The β-Rayleigh Distribution», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
G. Domínguez-Conde, Comesaña, P., y Pérez-González, F., «Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.Icono PDF tifs09performanceanalysis.pdf (232.67 KB)
G. Domínguez-Conde, Comesaña, P., y Pérez-González, F., «Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.Icono PDF icip09domcomper.pdf (129.76 KB)
J. R. Troncoso-Pastoriza, Comesaña, P., y Pérez-González, F., «Secure Direct and Iterative Protocols for Solving Systems of Linear Equations», in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.Icono PDF secure_sle_speedws09.pdf (193.97 KB)
J. R. Troncoso-Pastoriza y Pérez-González, F., «Skewed Log-Stable model for natural images pixel block-variance», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
L. Pérez-Freire y Pérez-González, F., «Spread spectrum watermarking security», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
J. R. Troncoso-Pastoriza, Comesaña, P., Pérez-Freire, L., y Pérez-González, F., «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.Icono PDF drm18-troncoso.pdf (417.17 KB)
2007
F. Pérez-González, Heileman, G. L., y Abdallah, C. T., «Benford's Law in Image Processing», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007.