Solapas principales
«Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks», EURASIP Journal on Information Security, 2007.
, «Exploiting security holes in lattice data hiding», in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.
, «A Generalization of Benford's Law and Its Application to Images», in European Control Conference (ECC), Kos, Greece, 2007.
, «Modeling Gabor coefficients via Generalized Gaussian Distributions for face recognition», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264. gonzalezjimenez_camera_ready.pdf (339.33 KB)
, «A Novel Interpretation of Content Authentication», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07authentication.pdf (179.34 KB)
, «Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264. icassp07reproducible.pdf (67.03 KB)
, «Security of Spread-Spectrum-Based Data Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
, «Two different approaches for attacking BOWS», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07bows.pdf (416.45 KB)
, «On a watermarking scheme in the logarithmic domain and its perceptual advantages», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264. icip07logwat.pdf (77.03 KB)
, «An accurate analysis of scalar quantization-based data-hiding», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, «On achievable security levels for lattice data hiding in the Known Message Attack scenario», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, «Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
, «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sensitivity.ps (1.62 MB)
, «On distortion-compensated Dither Modulation data-hiding with repetition coding», IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
, «High-rate quantization data hiding robust to arbitrary linear filtering attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, «The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006. ieee-spl06_cropping.ps (243.75 KB)
, «Improving the performance of RDM watermarking by means of trellis coded quantisation», IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006.
, «A novel model for the print-and-capture channel in 2D bar codes», in International Workshop on Multimedia Content Representation, Classification and Security, Istambul, Turkey, 2006, vol. 4105, pp. 627-634.
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», Signal Processing, vol. 86, pp. 1076-1088, 2006.
, «Secret dither estimation in lattice-quantization data hiding: a set-membership approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, «Watermarking security: a survey», Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB)
, «Zero-Knowledge watermark detector robust to sensitivity attacks», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
,