C
P. Comesaña, Merhav, N., y Barni, M., «Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.Icono PDF spie08one-bit-wm.pdf (277.85 KB)
P. Comesaña y Pérez-González, F., «Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007.Icono PDF jis07bows.pdf (436.69 KB)Archivo Source code available here. (8.51 MB)
P. Comesaña y Pérez-González, F., «On the capacity of stegosystems», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.Icono PDF acm07stego.pdf (198.41 KB)
P. Comesaña y Pérez-González, F., «Dither modulation in the logarithmic domain», in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.Icono PDF iwdw07.pdf (183.38 KB)
C
P. Comesaña, Balado, F., y Pérez-González, F., «A Novel Interpretation of Content Authentication», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.Icono PDF spie07authentication.pdf (179.34 KB)
B
M. Barni, Pérez-González, F., Comesaña, P., y Bartoli, G., «Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.Icono PDF icassp07reproducible.pdf (67.03 KB)
C
P. Comesaña y Pérez-González, F., «Two different approaches for attacking BOWS», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.Icono PDF spie07bows.pdf (416.45 KB)
P. Comesaña y Pérez-González, F., «On a watermarking scheme in the logarithmic domain and its perceptual advantages», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.Icono PDF icip07logwat.pdf (77.03 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.Archivo iee-06bnsa.ps (1.67 MB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.Archivo spie06_sensitivity.ps (1.62 MB)
P. Comesaña, Pérez-González, F., y Balado, F., «On distortion-compensated Dither Modulation data-hiding with repetition coding», IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.Icono PDF dcdm_uvigo05.pdf (311.95 KB)
P. Comesaña y Pérez-González, F., «The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.Archivo ieee-spl06_cropping.ps (243.75 KB)
P
L. Pérez-Freire, Pérez-González, F., y Comesaña, P., «Secret dither estimation in lattice-quantization data hiding: a set-membership approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.Icono PDF spie06_sme.pdf (223.01 KB)
L. Pérez-Freire, Pérez-González, F., Furon, T., y Comesaña, P., «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.Icono PDF tifs06security.pdf (563.51 KB)
C
P. Comesaña, Pérez-González, F., y Willems, F. M. J., «Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.Icono PDF spie05_dpc.pdf (165.56 KB)
P
L. Pérez-Freire, Comesaña, P., y Pérez-González, F., «Detection in quantization-based watermarking: performance and security issues», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.Icono PDF spie05_secur.pdf (401.96 KB)