@article {1070, title = {An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {19}, year = {2024}, pages = {385-400}, keywords = {Adaptation models, adaptive processing, cameras, Distortion, distortion correction, Fingerprint recognition, forensics, Image forensics, Lenses, PCE, photo response non-uniformity, PRNU, radial correction, Smart phones, source attribution}, doi = {10.1109/TIFS.2023.3318933}, url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=10265255}, author = {Montibeller, Andrea and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {1060, title = {Multibeam Compact Dual Reflectarray Antenna for High-Throughput Satellites in Ka-Band}, booktitle = {18th European Conference on Antennas and Propagation}, year = {2024}, author = {Daniel Mart{\'\i}nez-de-Rioja and Eduardo Mart{\'\i}nez-de-Rioja and Y Rodr{\'\i}guez-Vaqueiro and A Pino and Carlos Mosquera and Jos{\'e} A. Encinar and Giovanni Toso} } @conference {1072, title = {Exploiting PRNU and Linear Patterns in Forensic Camera Attribution under Complex Lens Distortion Correction}, booktitle = {ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, year = {2023}, pages = {1-5}, keywords = {Acoustic distortion, Camera Attribution, Camera Source Identification, cameras, forensics, GPU, Graphics processing units, interpolation, PRNU, Radial Distortion Correction, Reliability, Software}, doi = {10.1109/ICASSP49357.2023.10096605}, url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=10096605}, author = {Montibeller, Andrea and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {1069, title = {Information Forensics and Security: A quarter-century-long journey}, journal = {IEEE Signal Processing Magazine}, volume = {40}, year = {2023}, pages = {67-79}, keywords = {forensics, History, Information processing, Information security, Intellectual property, Machine Learning, privacy, Signal processing, Surveillance}, doi = {10.1109/MSP.2023.3275319}, url = {https://ieeexplore.ieee.org/document/10188887}, author = {Barni, Mauro and Campisi, Patrizio and Delp, Edward J. and Do{\"e}rr, Gwena{\"e}l and Fridrich, Jessica and Memon, Nasir and Fernando P{\'e}rez-Gonz{\'a}lez and Rocha, Anderson and Verdoliva, Luisa and Wu, Min} } @conference {1063, title = {Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies}, booktitle = {IEEE International Conference on Cyber Security and Resilience (CSR)}, year = {2023}, pages = {604-611}, publisher = {IEEE}, organization = {IEEE}, address = {Venice, Italy}, isbn = {979-8-3503-1170-9}, doi = {https://doi.org/10.1109/CSR57506.2023.10224961}, author = {Alberto Pedrouzo-Ulloa and Jan Ramon and Fernando P{\'e}rez-Gonz{\'a}lez and Siyanna Lilova and Patrick Duflot and Zakaria Chihani and Nicola Gentili and Paola Ulivi and Mohammad Ashadul Hoque and Twaha Mukammel and Zeev Pritzker and Augustin Lemesle and Jaime Loureiro-Acu{\~n}a and Xavier Mart{\'\i}nez and Gonzalo Jim{\'e}nez-Balsa} } @conference {1064, title = {Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation}, booktitle = {IEEE International Conference on Cyber Security and Resilience (CSR)}, year = {2023}, pages = {612-617}, publisher = {IEEE}, organization = {IEEE}, address = {Venice, Italy}, isbn = {979-8-3503-1170-9}, doi = {https://doi.org/10.1109/CSR57506.2023.10224961}, author = {Alberto Pedrouzo-Ulloa and Aymen Boudguiga and Olive Chakraborty and Renaud Sirdey and Oana Stan and Martin Zuber} } @article {1068, title = {Source camera attribution via PRNU emphasis: Towards a generalized multiplicative model}, journal = {Signal Processing: Image Communication}, volume = {114}, year = {2023}, issn = {0923-5965}, doi = {https://doi.org/10.1016/j.image.2023.116944}, url = {https://www.sciencedirect.com/science/article/pii/S0923596523000267}, author = {Fern{\'a}ndez-Mendui{\~n}a, Samuel and Fernando P{\'e}rez-Gonz{\'a}lez and Miguel Masciopinto} } @conference {1073, title = {Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-Based Codes}, booktitle = {2023 IEEE International Workshop on Information Forensics and Security (WIFS)}, year = {2023}, pages = {1-6}, keywords = {Artificial neural networks, black-box, Closed box, Codes, Data security, DNN watermarking, Fingerprinting, forensics, Tardos codes, Training, Traitor tracing, watermarking, white-box}, doi = {10.1109/WIFS58808.2023.10374879}, url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=10374879}, author = {Elena Rodr{\'\i}guez-Lois and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {1029, title = {A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection}, booktitle = {EUSIPCO}, year = {2022}, address = {Belgrade, Serbia}, abstract = {
Double JPEG compression detection has become a core issue in image forensics, as it provides information about the processing history of the image and its authenticity. Several recent works address this problem by exploiting the potential of CNNs to achieve state-of-the-art performance on test datasets. Unfortunately, those schemes are typically tailored to their specific training conditions and suffer a significant drop of performance in real-life scenarios. This paper aims at assessing the influence of quantization table mismatch (with regards to those seen in training) in the detection of double JPEG compression. Experimental results show inconsistency between different sets of quantization tables, with trained models yielding significantly worse results on unknown sets. This effect is also evident in a more realistic setting, where it appears to be more noticeable for sources falling in operating regions with greater inconsistency.
},
keywords = {Convolutional Neural Networks, Double JPEG compression, Image forensics, Source heterogeneity},
author = {Elena Rodr{\'\i}guez-Lois and David V{\'a}zquez-Pad{\'\i}n and Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a}
}
@conference {1026,
title = {A Dynamic Codebook Design for Analog Beamforming in MIMO LEO Satellite Communications},
booktitle = {IEEE International Conference on Communications (ICC)},
year = {2022},
author = {Joan Palacios and Nuria Gonz{\'a}lez-Prelcic and Carlos Mosquera}
}
@article {1048,
title = {Efficient protocols for oblivious linear function evaluation from ring-LWE},
journal = {Journal of Computer Security},
volume = {30},
year = {2022},
month = {01/2022},
pages = {40},
chapter = {39},
issn = {0926-227X},
doi = {10.3233/JCS-200116},
author = {Carsten Baum and Daniel Escudero and Alberto Pedrouzo-Ulloa and Peter Scholl and Juan Ram{\'o}n Troncoso-Pastoriza}
}
@conference {1071,
title = {Gpu-Accelerated Sift-Aided Source Identification of Stabilized Videos},
booktitle = {2022 IEEE International Conference on Image Processing (ICIP)},
year = {2022},
pages = {2616-2620},
keywords = {Codes, Deep Learning, estimation, forensics, GPU, Graphics processing units, Image processing, PRNU, SIFT, Video Source Identification, Video Stabilization, Visualization},
doi = {10.1109/ICIP46576.2022.9897579},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=9897579},
author = {Montibeller, Andrea and Pasquini, Cecilia and Boato, Giulia and Dell{\textquoteright}Anna, Stefano and Fernando P{\'e}rez-Gonz{\'a}lez}
}
@conference {1049,
title = {Secure Collaborative Camera Attribution},
booktitle = { European Interdisciplinary Cybersecurity Conference (EICC)},
year = {2022},
pages = {97-98},
publisher = {ACM},
organization = {ACM},
address = {Barcelona, Spain},
isbn = {978-1-4503-9603-5},
doi = {https://doi.org/10.1145/3528580.3532993},
author = {Alberto Pedrouzo-Ulloa and Fernando P{\'e}rez-Gonz{\'a}lez and David V{\'a}zquez-Pad{\'\i}n}
}
@conference {1020,
title = {DNN Watermarking: Four Challenges and a Funeral},
booktitle = {2021 ACM Workshop on Information Hiding and Multimedia Security, IH\&MMSEC{\textquoteright}21},
year = {2021},
month = {06/2021},
pages = {189-196},
address = {Virtual Event Belgium},
doi = {https://doi.org/10.1145/3437880.3460399},
url = {http://dl.acm.org/citation.cfm?id=3460399},
author = {Barni, Mauro and Fernando P{\'e}rez-Gonz{\'a}lez and Tondi, Benedetta}
}
@conference {1039,
title = {Full-stack Hybrid Beamforming in mmWave 5G Networks},
booktitle = {2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)},
year = {2021},
pages = {1{\textendash}7},
doi = {10.1109/MedComNet52149.2021.9501238},
author = {Gomez-Cuba, Felipe and Zugno, Tommaso and Kim, Junseok and Polese, Michele and Bahk, Saewoong and Zorzi, Michele}
}
@conference {1002,
title = {Homomorphic SVM Inference for Fraud Detection},
booktitle = {VI Jornadas Nacionales de Investigaci{\'o}n en Ciberseguridad (JNIC)},
year = {2021},
publisher = {Ediciones de la Universidad de Castilla-La Mancha},
organization = {Ediciones de la Universidad de Castilla-La Mancha},
author = {Adri{\'a}n V{\'a}zquez-Saavedra and Gonzalo Jim{\'e}nez-Balsa and Jaime Loureiro-Acu{\~n}a and Manuel Fern{\'a}ndez-Veiga and Alberto Pedrouzo-Ulloa}
}
@article {1007,
title = {A Hybrid Beamforming Design for Massive MIMO LEO Satellite Communications },
journal = {Frontiers in Space Technologies},
volume = {2},
year = {2021},
issn = {2673-5075},
doi = {10.3389/frspt.2021.696464},
url = {https://www.frontiersin.org/articles/10.3389/frspt.2021.696464/full},
author = {Joan Palacios and Nuria Gonz{\'a}lez-Prelcic and Carlos Mosquera and Takayuki Shimizu and Chang-Heng Wang}
}
@article {1016,
title = {On the information leakage quantification of camera fingerprint estimates},
journal = {Eurasip Journal on Information Security},
volume = {2021},
year = {2021},
pages = {18},
doi = {https://doi.org/10.1186/s13635-021-00121-6},
url = {https://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-021-00121-6},
author = {Fern{\'a}ndez-Mendui{\~n}a, Samuel and Fernando P{\'e}rez-Gonz{\'a}lez}
}
@article {1018,
title = {Multiquadratic rings and oblivious linear function evaluation},
journal = {TEMat monogr{\'a}ficos},
volume = {2},
year = {2021},
pages = {83-86},
issn = {2660-6003},
url = {https://temat.es/monograficos/article/view/vol2-p83},
author = {Alberto Pedrouzo-Ulloa}
}
@conference {1074,
title = {PRNU-leaks: facts and remedies},
booktitle = {2020 28th European Signal Processing Conference (EUSIPCO)},
year = {2021},
pages = {720-724},
keywords = {Degradation, estimation, Europe, Fingerprint, Fingerprint recognition, forensics, information theory, Leakage, Membership inference, privacy, PRNU, Signal processing},
doi = {10.23919/Eusipco47968.2020.9287451},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=9287451},
author = {Fernando P{\'e}rez-Gonz{\'a}lez and Fern{\'a}ndez-Mendui{\~n}a, Samuel}
}
@conference {1001,
title = {A Review of "Camera Attribution Forensic Analyzer in the Encrypted Domain"},
booktitle = {VI Jornadas Nacionales de Investigaci{\'o}n en Ciberseguridad (JNIC)},
year = {2021},
publisher = {Ediciones de la Universidad de Castilla-La Mancha},
organization = {Ediciones de la Universidad de Castilla-La Mancha},
author = {Alberto Pedrouzo-Ulloa and Miguel Masciopinto and Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez}
}
@article {1000,
title = {Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography},
journal = {Mathematics},
volume = {9},
year = {2021},
chapter = {858},
author = {Alberto Pedrouzo-Ulloa and Juan Ram{\'o}n Troncoso-Pastoriza and Nicolas Gama and Mariya Georgieva and Fernando P{\'e}rez-Gonz{\'a}lez}
}
@article {997,
title = {Space-Time Rate Splitting for the MISO BC with Magnitude CSIT},
journal = {IEEE Transactions on Communications},
year = {2021},
author = {Carlos Mosquera and Nele Noels and Tom{\'a}s Ram{\'\i}rez and M{\`a}rius Caus and Adriano Pastore}
}
@article {1017,
title = {Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks},
volume = {22},
year = {2020},
month = {12/2020},
pages = {36},
doi = { https://doi.org/10.3390/e22121379},
url = {https://www.mdpi.com/1099-4300/22/12/1379},
author = {Corti{\~n}as-Lorenzo, Betty and Fernando P{\'e}rez-Gonz{\'a}lez}
}
@conference {999,
title = {Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE},
booktitle = {International Conference on Security and Cryptography for Networks (SCN)},
year = {2020},
publisher = {Springer},
organization = {Springer},
author = {Carsten Baum and Daniel Escudero and Alberto Pedrouzo-Ulloa and Peter Scholl and Juan Ram{\'o}n Troncoso-Pastoriza}
}
@conference {998,
title = {Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation},
booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)},
year = {2020},
publisher = {IEEE},
organization = {IEEE},
author = {Alberto Pedrouzo-Ulloa and Juan Ram{\'o}n Troncoso-Pastoriza and Nicolas Gama and Mariya Georgieva and Fernando P{\'e}rez-Gonz{\'a}lez}
}
@conference {987,
title = {Non-coherent rate-splitting for multibeam satellite forward link: practical coding and decoding algorithms},
booktitle = {IEEE 91st Vehicular Technology Conference (VTC2020-Spring), 25-28 May 2020, virtual event.},
year = {2020},
author = {Nele Noels and Marc Moeneclaey and Tom{\'a}s Ram{\'\i}rez and Carlos Mosquera and M{\`a}rius Caus and Adriano Pastore}
}
@conference {1021,
title = {PRNU-leaks: facts and remedies},
booktitle = { 2020 28th European Signal Processing Conference (EUSIPCO)},
year = {2020},
month = {2021},
address = {Virtual Event Amsterdam},
doi = {10.23919/Eusipco47968.2020.9287451},
url = {https://ieeexplore.ieee.org/document/9287451},
author = {Fernando P{\'e}rez-Gonz{\'a}lez and Fern{\'a}ndez-Mendui{\~n}a, Samuel}
}
@article {1019,
title = {Temporal Localization of Non-Static Digital Videos Using the Electrical Network Frequency},
journal = {IEEE Signal Processing Letters},
volume = {27},
year = {2020},
month = {04/2020},
pages = {5},
chapter = {745},
doi = {10.1109/LSP.2020.2988145},
url = {https://ieeexplore.ieee.org/document/9072308},
author = {Fern{\'a}ndez-Mendui{\~n}a, Samuel and Fernando P{\'e}rez-Gonz{\'a}lez}
}
@article {975,
title = {Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint},
journal = {IEEE Transactions on Information Forensics and Security},
volume = {15},
year = {2020},
month = {12/2019},
pages = {1815-1830},
chapter = {1815},
abstract = {The Variation of Prediction Footprint (VPF), formerly used in video forensics for double compression detection and GOP size estimation, is comprehensively investigated to improve its acquisition capabilities and extend its use to video sequences that contain bi-directional frames (B-frames). By relying on a universal rate-distortion analysis applied to a generic double compression scheme, we first explain the rationale behind the presence of the VPF in double compressed videos and then justify the need of exploiting a new source of information such as the motion vectors, to enhance the VPF acquisition process. Finally, we describe the shifted VPF induced by the presence of B-frames and detail how to compensate the shift to avoid misguided GOP size estimations. The experimental results show that the proposed Generalized VPF (G-VPF) technique outperforms the state of the art, not only in terms of double compression detection and GOP size estimation, but also in reducing computational time.
}, keywords = {B-frames, double compression detection, GOP size estimation, rate distortion optimization, video forensics}, author = {David V{\'a}zquez-Pad{\'\i}n and Marco Fontani and Dasara Shullani and Fernando P{\'e}rez-Gonz{\'a}lez and Alessandro Piva and Mauro Barni} } @conference {971, title = {Dynamic Attribute-Based Privacy-Preserving Genomic Susceptibility Testing}, booktitle = {34th Annual ACM Symposium on Applied Computing, SAC 2019}, year = {2019}, month = {04/2019}, address = {Limassol, Cyprus}, author = {Mina Namazi and Cihan Eryonucu and Erman Ayday and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {973, title = {Efficient PRNU Matching in the Encrypted Domain}, booktitle = {XoveTIC}, year = {2019}, publisher = {MDPI}, organization = {MDPI}, address = {A Coru{\~n}a, Spain}, keywords = {camera attribution forensic analyzer, digital media forensics, lattice-based cryptosystems, Photoresponse Non-Uniformity}, author = {Alberto Pedrouzo-Ulloa and Miguel Masciopinto and Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @inbook {956, title = {Expectation{\textendash}maximisation based distributed estimation in sensor networks}, booktitle = {Data Fusion in Wireless Sensor Networks: A statistical signal processing perspective}, year = {2019}, pages = {201-230}, publisher = {The Institution of Engineering and Technology (IET)}, organization = {The Institution of Engineering and Technology (IET)}, chapter = {9}, address = {London, UK}, abstract = {Estimating the unknown parameters of a statistical model based on the observations collected by a sensor network is an important problem with application in multiple fields. In this setting, distributed processing, by which computations are carried out within the network in order to avoid raw data transmission to a fusion centre, is a desirable feature resulting in improved robustness and energy savings. In the presence of incomplete data, the expectation-maximisation (EM) algorithm is a popular means to iteratively compute the maximum likelihood (ML) estimate. It has found application in diverse fields such as computational biology, anomaly detection, speech segmentation, reinforcement learning, and motion estimation, among others. In this chapter we will review the formulation of the centralised EM estimation algorithm as a starting point and then discuss distributed versions well suited for implementation in sensor networks. The first class of these distributed versions requires specialised routing through the network in terms of a linear or circular path visiting all nodes, whereas the second class does away with this requirement by using the concept of network consensus to diffuse information through the network. Our focus will be on a relevant sensor network application, in which the parameter of a linear model is to be estimated in the presence of an unknown number of randomly malfunctioning sensors.
}, keywords = {winter, wsn}, isbn = {978-1-78561-584-9}, author = {R. L{\'o}pez-Valcarce and Alba Pag{\`e}s-Zamora} } @mastersthesis {983, title = {Homomorphic Lattice Cryptosystems for Secure Signal Processing}, year = {2019}, school = {University of Vigo}, address = {Vigo}, author = {Alberto Pedrouzo-Ulloa} } @article {970, title = {Improving PRNU Compression Through Preprocessing, Quantization, and Coding}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {14}, year = {2019}, month = {03/2019}, pages = {13}, chapter = {608}, author = {L. Bondi and P. Bestagini and Fernando P{\'e}rez-Gonz{\'a}lez and S. Tubaro} } @conference {965, title = {Neural Network Aided Computation of Generalized Spatial Modulation Capacity}, booktitle = {27th European Signal Processing Conference (EUSIPCO)}, year = {2019}, address = {A Coru{\~n}a (Spain)}, abstract = {Generalized Spatial Modulation (GSM) is being considered for future high-capacity and energy efficient terrestrial networks. A variant such as Polarized Modulation (PMod) has also a role in Dual Polarization Mobile Satellite Systems. The implementation of adaptive GSM systems requires fast methods to evaluate the channel dependent GSM capacity, which amounts to solve multi-dimensional integrals without closed-form solutions. For this purpose, we propose the use of a Multilayer Feedforward Neural Network and an associated feature selection algorithm. The resulting method is highly accurate and with much lower complexity than alternative numerical methods.
}, keywords = {Generalized Spatial Modulation, Index Modulations, Machine Learning, Multilayer Feedforward Neural Network, Polarized Modulation}, author = {Anxo Tato and Carlos Mosquera and Pol Henarejos and Ana P{\'e}rez-Neira} } @conference {967, title = {Prediction Residue Analysis in MPEG-2 Double Compressed Video Sequences}, booktitle = {EUSIPCO}, year = {2019}, month = {09/2019}, pages = {1109-1113}, address = {A Coru{\~n}a, Spain}, abstract = {In video forensics, the study of the prediction residue across successive frames is key to verify the integrity of digital videos. Focusing on an MPEG-2 double compression scheme, we analyze how the variance of the prediction residue evolves during the second compression depending on the type of frame (either I or P) employed in the first encoding and exploring different compression strengths and deadzone widths for quantization. This analysis reveals that the width of the quantizer deadzones actually affects the performance of existing methods based on the Variation of Prediction Footprint (VPF) for double compression detection and Group Of Pictures (GOP) size estimation. The predicted behavior from the theoretical characterization of the prediction residue is confirmed through experimental results with real video sequences.
}, keywords = {double compression detection, GOP size estimation, MPEG-2, prediction residue analysis, video forensics}, author = {David V{\'a}zquez-Pad{\'\i}n and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {974, title = {Rethinking Location Privacy for Unknown Mobility Behaviors}, booktitle = {IEEE European Symposium on Security and Privacy (EuroS\&P)}, year = {2019}, author = {Simon Oya and Carmela Troncoso and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {972, title = {Revisiting Multivariate Lattices for Encrypted Signal Processing}, booktitle = {ACM Information Hiding and Multimedia Security Workshop (IH\&MMSec)}, year = {2019}, publisher = {ACM}, organization = {ACM}, address = {Paris, France}, keywords = {homomorphic encryption, Lattice-Based Cryptography, Multidimensional Signal Processing, Secure Signal Processing}, author = {Alberto Pedrouzo-Ulloa and Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {955, title = {Technical Report: MPEG-2 Prediction Residue Analysis}, year = {2019}, institution = {University of Vigo}, author = {David V{\'a}zquez-Pad{\'\i}n and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {942, title = {Adjacent Beams Resource Sharing to Serve Hot Spots : A Rate Splitting Approach}, booktitle = {36th International Communications Satellite Systems Conference (ICSSC)}, year = {2018}, month = {10/2018}, address = {Niagara Falls, Canada}, abstract = {Mutual Information is the metric that is used to perform link adaptation, which allows to achieve rates near capacity. The computation of adaptive transmission modes is achieved by employing the mapping between the Signal to Noise Ratio and the Mutual Information. Due to the high complexity of the computation of the Mutual Information, this process is performed off-line via Monte Carlo simulations, whose results are stored in look-up tables. However, in Index Modulations, such as Spatial Modulation or Polarized Modulation, this is not feasible since the constellation and the Mutual Information are channel dependent and it would require to compute this metric at each time instant if the channel is time varying. In this paper, we propose different approximations in order to obtain a simple closed-form expression that allows to compute the Mutual Information at each time instant and thus, making feasible the link adaptation.
}, author = {Pol Henarejos and Ana P{\'e}rez-Neira and Anxo Tato and Carlos Mosquera} } @conference {936, title = {Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems}, booktitle = {15th International Symposium on Wireless Communication Systems (ISWCS)}, year = {2018}, address = { Lisbon, Portugal}, author = {M{\`a}rius Caus and Adriano Pastore and M{\`o}nica Navarro and Tom{\'a}s Ram{\'\i}rez and Carlos Mosquera and Nele Noels and Nader Alagha and Ana I. Perez-Neira} } @conference {937, title = {Message-Splitting for Interference Cancellation in Multibeam Satellite Systems}, booktitle = {9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC)}, year = {2018}, address = { Berlin, Germany}, author = {Tom{\'a}s Ram{\'\i}rez and Carlos Mosquera and M{\`a}rius Caus and Adriano Pastore and M{\`o}nica Navarro and Nele Noels} } @article {913, title = {Parameter estimation in wireless sensor networks with faulty transducers: A distributed EM approach}, journal = {Signal Processing}, volume = {144}, year = {2018}, month = {03/2018}, pages = {226-237}, abstract = {We address the problem of distributed estimation of a vector-valued parameter performed by a wireless sensor network in the presence of noisy observations which may be unreliable due to faulty transducers. The proposed distributed estimator is based on the Expectation-Maximization (EM) algorithm and combines consensus and diffusion techniques: a term for information diffusion is gradually turned off, while a term for updated information averaging is turned on so that all nodes in the network approach the same value of the estimate. The proposed method requires only local exchanges of information among network nodes and, in contrast with previous approaches, it does not assume knowledge of the a priori probability of transducer failures or the noise variance. A convergence analysis is provided, showing that the convergent points of the centralized EM iteration are locally asymptotically convergent points of the proposed distributed scheme. Numerical examples show that the distributed algorithm asymptotically attains the performance of the centralized EM method.
}, keywords = {winter, wsn}, doi = {10.1016/j.sigpro.2017.10.012}, url = {https://authors.elsevier.com/a/1W90XbZX4rsob}, author = {Silvana Silva Pereira and R. L{\'o}pez-Valcarce and Alba Pag{\`e}s-Zamora} } @conference {934, title = {Practical Implementation of Link Adaptation with Dual Polarized Modulation (Best paper award)}, booktitle = {11th International Symposium on Communication Systems, Networks, and Digital Signal Processing.}, year = {2018}, author = {Anxo Tato and Carlos Mosquera and Pol Henarejos and Ana P{\'e}rez-Neira} } @conference {940, title = {Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals}, booktitle = {European Signal Processing Conference (EUSIPCO)}, year = {2018}, month = {2018}, address = {Rome, Italy}, author = {Miguel Masciopinto and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {950, title = {Symbol-Asynchronous Transmission In Multibeam Satellite User Down-Link: Rate Regions For Novel Superposition Coding Schemes}, booktitle = {6th IEEE Global Conference on Signal and Information Processing}, year = {2018}, abstract = {We consider the forward link of a multibeam satellite system with high spectral reuse and the novel low-complexity transmission and detection strategies from ["{\textquotedblleft}Exploratory analysis of superposition coding and rate splitting for multibeam satellite systems", ISWCS 2018]. More specifically, we study the impact of a time offset between the antenna beams that cooperate to simultaneously serve a given user. Assuming Gaussian signaling, we provide closed-form expressions for the achievable rate region. It is demonstrated that, in the absence of timing information at the gateway, this region is not affected by a time offset. Our numerical results further show that, in case timing is known at the gateway, an offset of half a symbol period at both user terminals is optimal in terms of spectral efficiency.
}, author = {Nele Noels and Marc Moeneclaey and Tom{\'a}s Ram{\'\i}rez and Carlos Mosquera and M{\`a}rius Caus and Adriano Pastore} } @conference {906, title = {Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, year = {2017}, author = {Simon Oya and Carmela Troncoso and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {932, title = {Design of projection matrices for PRNU compression}, booktitle = {2017 IEEE Workshop on Information Forensics and Security (WIFS)}, year = {2017}, month = {Dec}, pages = {1-6}, keywords = {acquisition time, cameras, computational complexity, data compression, defacto standard, design methodology, digital photo, forensics investigators, image coding, Image forensics, image sensors, image source identification, interpolation, matrix algebra, nearly-flat spectral characteristics, Performance evaluation, photo response nonuniformity, PRNU compression, probability, projection matrices, public image dataset, Signal to noise ratio, silicon sensor imperfections, specific camera sensor, weak multiplicative noise}, doi = {10.1109/WIFS.2017.8267652}, author = {L. Bondi and Fernando P{\'e}rez-Gonz{\'a}lez and P. Bestagini and S. Tubaro} } @conference {877, title = {Filter design for delay-based anonymous communications}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)}, year = {2017}, keywords = {adversarial signal processing, compass, Multimedia security, winter}, author = {Simon Oya and Fernando P{\'e}rez-Gonz{\'a}lez and Carmela Troncoso} } @conference {908, title = {Is Geo-Indistinguishability what you are looking for?}, booktitle = {Workshop on Privacy in the Electronic Society (WPES)}, year = {2017}, keywords = {adversarial signal processing, Multimedia security, winter}, author = {Simon Oya and Carmela Troncoso and Fernando P{\'e}rez-Gonz{\'a}lez} } @proceedings {909, title = {Link Adaptation Algorithms for Dual Polarization Mobile Satellite Systems}, journal = {9th EAI International Conference on Wireless and Satellite Systems, WISATS}, volume = {Wireless and Satellite Systems}, year = {2017}, month = {2018}, pages = {52-61}, publisher = {Springer International Publishing}, address = {Oxford}, abstract = {The use of dual polarization in mobile satellite systems is
very promising as a means for increasing the transmission capacity. In this paper a system which uses simultaneously two orthogonal polarizations in order to communicate with the users is studied. The application of MIMO signal processing techniques along with Adaptive Coding and Modulation in the forward link can provide remarkable throughput gains up to 100 \% when compared with the single polarization system. The gateway is allowed to vary the MIMO and Modulation\ and Coding Schemes for each frame. The selection is done by means of a link adaptation algorithm which uses a tunable margin to achieve a predefined target Frame Error Rate.
\ The stochastic representation of digital images through a two-dimensional autoregressive (2D-AR) model offers a proper way to approximate the empirical distribution of the eigenvalues coming from genuine images. By considering this model, we apply random matrix theory to analytically derive the asymptotic eigenvalue distribution of causal 2D-AR random fields that have undergone an upscaling operation with a particular interpolation kernel. This eigenvalue characterization is useful in developing new forensic techniques for image resampling detection since we can use theoretical bounds to drive the decision of detectors based on subspace decomposition. Moreover, experimental results with real images show that the obtained asymptotic limits turn out to be excellent approximations, even when working with images of small size.
}, keywords = {Multimedia security, winter}, author = {David V{\'a}zquez-Pad{\'\i}n and Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a} } @conference {876, title = {Robust clustering of data collected via crowdsourcing}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)}, year = {2017}, month = {03/2017}, pages = {4014 - 4018}, address = {New Orleans}, abstract = {Crowdsourcing approaches rely on the collection of multiple individuals to solve problems that require analysis of large data sets in a timely accurate manner. The inexperience of participants or annotators motivates well robust techniques. Focusing on clustering setups, the data provided by all annotators is suitably modeled here as a mixture of Gaussian components plus a uniformly distributed random variable to capture outliers. The proposed algorithm is based on the expectation-maximization algorithm and allows for soft assignments of data to clusters, to rate annotators according to their performance, and to estimate the number of Gaussian components in the non-Gaussian/Gaussian mixture model, in a jointly manner.
}, keywords = {winter, wsn}, doi = {10.1109/ICASSP.2017.7952910}, author = {Alba Pag{\`e}s-Zamora and Georgios Giannakis and R. L{\'o}pez-Valcarce and Pere Gimenez-Febrer} } @conference {883, title = {Secure Genomic Susceptibility Testing based on Lattice Encryption}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, year = {2017}, publisher = {IEEE}, organization = {IEEE}, address = {New Orleans, USA}, keywords = {adversarial signal processing, compass, Genomic Privacy, homomorphic encryption, Lattice-Based Cryptography, Privacy Protection}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Alberto Pedrouzo-Ulloa and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {895, title = {Smart Detection of Line-Search Oracle Attacks}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {12}, year = {2017}, month = {03/2017}, pages = {588-603}, chapter = {588}, author = {Tondi, Benedetta and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez and Barni, Mauro} } @article {905, title = {Statistical detection of JPEG traces in digital images in uncompressed formats}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {12}, year = {2017}, author = {Cecilia Pasquini and Giulia Boato and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {888, title = {Technical Report UV-TSC-DVP-19042017: Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling}, year = {2017}, institution = {University of Vigo}, issn = {UV-TSC-DVP-19042017}, author = {David V{\'a}zquez-Pad{\'\i}n and Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a} } @conference {841, title = {Advanced Signal Processing Techniques for Fixed and Mobile Satellite Communications}, booktitle = {8th Advanced Satellite Multimedia Systems Conference 14th Signal Processing for Space Communications Workshop}, year = {2016}, month = {09/2016}, keywords = {compass, full duplex, satcom}, author = {Pol Henarejos and Ana P{\'e}rez-Neira and Nicol{\`o} Mazzali and Carlos Mosquera} } @article {873, title = {Data Hiding Robust to Mobile Communication Vocoders}, journal = {IEEE Transactions on Multimedia}, volume = {18}, year = {2016}, month = {12/2016}, pages = {2345-2357}, doi = {10.1109/TMM.2016.2599149}, author = {Reza Kazemi and Fernando P{\'e}rez-Gonz{\'a}lez and Mohamed Ali Akhaee and Fereydoon Behnia} } @article {837, title = {Design of pool mixes against profiling attacks in real conditions}, journal = {IEEE/ACM Transactions on Networking}, volume = {24}, year = {2016}, month = {12/2016}, pages = {3662-3675}, keywords = {adversarial signal processing, compass}, doi = {10.1109/TNET.2016.2547391}, author = {Simon Oya and Fernando P{\'e}rez-Gonz{\'a}lez and Carmela Troncoso} } @conference {845, title = {Distributed multivariate regression with unknown noise covariance in the presence of outliers: a minimum description length approach}, booktitle = {IEEE Workshop on Statistical Signal Processing (SSP)}, year = {2016}, address = {Palma de Mallorca, Spain}, abstract = {We consider Total Least Squares (TLS) estimation in a network in which each node has access to a subset of equations of an overdetermined linear system. Previous distributed approaches require that the number of equations at each node be larger than the dimension L of the unknown parameter. We present novel distributed TLS estimators which can handle as few as a single equation per node. In the first scheme, the network computes an extended correlation matrix via standard iterative average consensus techniques, and the TLS estimate is extracted afterwards by means of an eigenvalue decomposition (EVD). The second scheme is EVD-free, but requires that a linear system of size L be solved at each iteration by each node. Replacing this step by a single Gauss-Seidel subiteration is shown to be an effective means to reduce computational cost without sacrificing performance.
}, keywords = {dynacs, wsn}, doi = {10.1109/ICASSP.2014.6855074}, author = {R. L{\'o}pez-Valcarce and Silvana Silva Pereira and Alba Pag{\`e}s-Zamora} } @conference {747, title = {Do dummies pay off? Limits of dummy traffic protection in anonymous communications}, booktitle = {Privacy Enhancing Technologies Symposium}, year = {2014}, keywords = {anonymous communications, compass, disclosure attacks, dummies}, author = {Simon Oya and Carmela Troncoso and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {736, title = {Flat Fading Channel Estimation Based on Dirty Paper Coding}, booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)}, year = {2014}, address = {Florence, Italy}, abstract = {A novel complex flat fading channel estimation scheme is proposed. Contrarily to previous schemes in the literature, this new approach is not based on introducing pilot sequences, but on reducing the \ interference caused by the information-bearing signal on the estimation-aiding signal by using Dirty Paper Coding. \ We show through simulations that our method outperforms the \ Partially-Data Dependent scheme, which is a state-of-the-art technique based on superimposed pilots.\
}, keywords = {channel estimation, dirty paper coding, dynacs, superimposed pilots}, doi = {10.1109/ICASSP.2014.6854852}, author = {Gabriel Dom{\'\i}nguez-Conde and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {733, title = {How to Implement Doubly-Stochastic Matrices for Consensus-Based Distributed Algorithms}, booktitle = {IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM)}, year = {2014}, address = {A Coru{\~n}a, Spain}, abstract = {We demonstrate the practical implementation of a schema for Smart Grid Last Mile (SGLM) traffic management in leased Internet access networks, based on well-known queue management and traffic marking algorithms such as Random Early Drop and Token Bucket. Internet access links are often over-provisioned, with much higher installed capacity than user needs, so domestic applications do not compete for bandwidth. In this scenario the additional load posed by SGLM traffic is negligible. On some occasions, however, Internet access links are moder- ately stressed and traffic management techniques are required for SGLM traffic to coexist seamlessly with user traffic. In a previous paper, we formulated a theoretical model for SGLM traffic in general networks, and a management solution for its coexistence with user traffic in the particular case of leased Internet access networks. In the present paper, we demonstrate the feasibility of that solution in a practical scenario. We have implemented the traffic management policies on real hardware and employed SGLM traffic generators to evaluate our schema in a real network. The results indicate that our proposal achieves low- latency SGLM communications in a scenario with high domestic user traffic
}, author = {Gomez-Cuba, Felipe and Gonz{\'a}lez-Casta{\~n}o, Francisco Javier and P{\'e}rez-Garrido, Carlos P.} } @article {728, title = {Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior}, year = {2014}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Carmela Troncoso and Simon Oya} } @article {738, title = {Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic}, year = {2014}, author = {Simon Oya and Carmela Troncoso and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {752, title = {Technical Report UV/TSC/APU/02102014: Multivariate Ring Learning with Errors}, year = {2014}, institution = {University of Vigo}, issn = {UV/TSC/APU/02102014}, author = {Alberto Pedrouzo-Ulloa and Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {729, title = {Transportation-theoretic image counterforensics to first significant digit histogram forensics}, booktitle = {IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP)}, year = {2014}, month = {05/2014}, publisher = {IEEE}, organization = {IEEE}, address = {Florence, Italy}, author = {Cecilia Pasquini and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {760, title = {Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks}, booktitle = {IEEE Workshop on Information Forensics and Security}, year = {2014}, author = {Simon Oya and Carmela Troncoso and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {678, title = {A Cognitive Mobile BTS Solution with Software-Defined Radioelectric Sensing}, journal = {Sensors}, volume = {13}, year = {2013}, month = {02/2013}, pages = { 2051-2075}, chapter = { 2051}, abstract = {\ Private communications inside large vehicles such as ships may be effectively provided using standard cellular systems. In this paper we propose a new solution based on software-defined radio with electromagnetic sensing support. Software-defined radio allows low-cost developments and, potentially, added-value services not available in commercial cellular networks. The platform of reference, OpenBTS, only supports single-channel cells. Our proposal, however, has the ability of changing BTS channel frequency without disrupting ongoing communications. This ability should be mandatory in vehicular environments, where neighbouring cell configurations may change rapidly, so a moving cell must be reconfigured in real-time to avoid interferences. Full details about frequency occupancy sensing and the channel reselection procedure are provided in this paper. Moreover, a procedure for fast terminal detection is proposed. This may be decisive in emergency situations, e.g., if someone falls overboard. Different tests confirm the feasibility of our proposal and its compatibility with commercial GSM terminals.
}, keywords = {cognitive radio, dynacs, mobile communications, SDR, vehicular communications}, doi = {10.3390/s130202051}, author = {J. Mu{\~n}oz and J. Vales-Alonso and F. Qui{\~n}oy-Garc{\'\i}a and Costas-Sanz, S. and M. Pillado and F.J. Gonz{\'a}lez-Casta{\~n}o and M. Garc{\'\i}a-Sanchez and R. L{\'o}pez-Valcarce and C. L{\'o}pez-Bravo} } @conference {720, title = {Coping with the enemy: Advances in adversary-aware signal processing}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, year = {2013}, month = {05/2013}, pages = {8682{\textendash}8686}, address = {Vancouver, Canada}, url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6639361}, author = {Mauro Barni and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {684, title = {A Diffusion-based distributed EM algorithm for density estimation in wireless sensor networks}, booktitle = {Int. Conf. Acoust., Speech, Signal Process. (ICASSP)}, year = {2013}, abstract = {We address the problem of distributed estimation of a parameter from a set of noisy observations collected by a sensor network, assuming that some sensors may be subject to data failures and report only noise. In such scenario, simple schemes such as the Best Linear Unbiased Estimator result in an error floor in moderate and high signal-to-noise ratio (SNR), whereas previously proposed methods based on hard decisions on data failure events degrade as the SNR decreases. Aiming at optimal performance within the whole range of SNRs, we adopt a Maximum Likelihood framework based on the Expectation-Maximization (EM) algorithm. The statistical model and the iterative nature of the EM method allow for a diffusion-based distributed implementation, whereby the information propagation is embedded in the iterative update of the parameters. Numerical examples show that the proposed algorithm practically attains the Cramer{\textendash}Rao Lower Bound at all SNR values and compares favorably with other approaches.
}, keywords = {dynacs, wsn}, doi = {10.1109/LSP.2013.2260329}, author = {Silvana Silva Pereira and R. L{\'o}pez-Valcarce and Alba Pag{\`e}s-Zamora} } @conference {719, title = {The flow fingerprinting game}, booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)}, year = {2013}, month = {11/2013}, pages = {97{\textendash}102}, address = {Guangzhou, China}, author = {Juan A. Elices and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {702, title = {Forensic analysis of full-frame linearly filtered JPEG images}, booktitle = {IEEE International Conference on Image Processing}, year = {2013}, month = {JPEG compression}, pages = {4517-4521}, address = {Melbourne, Australia}, keywords = {JPEG compression, linear filtering}, author = {Valentina Conotter and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {683, title = {Fully Private Noninteractive Face Verification}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {8}, year = {2013}, month = {07/2013}, pages = {1101-1114}, keywords = {SPED}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Daniel Gonz{\'a}lez-Jim{\'e}nez and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {710, title = {Joint detection of full-frame linear filtering and JPEG compression in digital images}, booktitle = {IEEE International Workshop on Information Forensics and Security}, year = {2013}, month = {11/2013}, publisher = {IEEE}, organization = {IEEE}, address = {Guangzhou, China}, author = {Valentina Conotter and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {675, title = {Least Squares Disclosure Attacks: User Profiling for Mix-based Anonymous Communication Systems}, year = {2013}, month = {01/2013}, institution = {University of Vigo}, address = {Vigo}, issn = {UV/TSC/FPG/30052012}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Carmela Troncoso} } @conference {688, title = {Localization of Forgeries in MPEG-2 Video through GOP Size and DQ analysis}, booktitle = {IEEE International Workshop on Multimedia Signal Processing (MMSP)}, year = {2013}, pages = {494-499}, address = {Pula (Sardinia), Italy}, abstract = {This work addresses forgery localization in MPEG-2 compressed videos. The proposed method is based on the analysis of Double Quantization (DQ) traces in frames that were encoded twice as intra (i.e., I-frames). \ Employing a state-of-the-art method, such frames are located in the video under analysis by estimating the size of the Group Of Pictures (GOP) that was used in the first compression; then, the DQ analysis is devised for the MPEG-2 encoding scheme and applied to frames that were intra-coded in both the first and second compression. In such a way, regions that were manipulated between the two encodings are detected. Compared to existing methods based on double quantization analysis, the proposed scheme makes forgery localization possible on a wider range of settings.
The problem of resampling factor estimation as a means for tampering detection has been largely investigated. Most of the existing techniques rely on the analysis of cyclic correlations induced in the resampled signal. However, in this paper, a new direction is explored by addressing the same problem in terms of the set-membership estimation theory. The proposed technique constructs a model of the problem using available a priori knowledge and in consonance with a finite number of observations that comes from the resampled signal under study. With this information, the proposed technique is able to provide an estimate of the resampling factor applied to the original signal and, if required, an estimate of such signal and an estimate of the interpolation filter. The performance in terms of accuracy and MSE of the proposed approach is evaluated and comparative results with state-of-the-art methods are reported.
Video forensics is an emerging discipline, that aims at inferring information about the processing history undergone by a digital video in a blind fashion. In this work we introduce a new forensic footprint and, based on it, propose a method for detecting whether a video has been encoded twice; if this is the case, we also estimate the size of the Group Of Pictures (GOP) employed during the first encoding. As shown in the experiments, the footprint proves to be very robust even in realistic settings (i.e., when encoding is carried out using typical compression rates), that are rarely addressed by existing techniques.
}, author = {David V{\'a}zquez-Pad{\'\i}n and Marco Fontani and Tiziano Bianchi and Pedro Comesa{\~n}a and Alessandro Piva and Mauro Barni} } @conference {721, title = {Fingerprinting a flow of messages to an anonymous server.}, booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)}, year = {2012}, month = {12/2012}, pages = {97{\textendash}102}, address = {Tenerife, Spain}, author = {Juan A. Elices and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {655, title = {Fully Homomorphic Faces}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2012}, month = {10/2012}, publisher = {IEEE}, organization = {IEEE}, address = {Lake Buena Vista, Florida, USA}, keywords = {face verification, homomorphic processing, lattice cryptography, privacy, watermarking}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {723, title = {A Least Squares approach to user profiling in pool mix-based anonymous communication systems.}, booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)}, year = {2012}, month = {12/2012}, pages = {115{\textendash}120}, address = {Tenerife, Spain}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Carmela Troncoso} } @conference {657, title = {Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools}, booktitle = {International Workshop on Digital-forensics and Watermarking}, year = {2012}, address = {Shanghai, China}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {645, title = {Overlay Cognitive Transmission in a Multicarrier Broadcast Network with Dominant Line of Sight Reception}, journal = {IEEE Transactions on Wireless Communications}, year = {2012}, keywords = {cognitive radio, dynacs, satcom}, doi = {10.1109/TWC.2012.092112.120257}, author = {Alberto Rico-Alvari{\~n}o and C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {634, title = {Overlay Spectrum Reuse in a Multicarrier Broadcast Network: Coverage Analysis}, booktitle = {The 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2012)}, year = {2012}, address = {Cesme, Turkey}, abstract = {A secondary cognitive user overlaying its message in a broadcast multicarrier network is studied. The secondary user exploits the primary message knowledge to convey its own information while preserving the primary user coverage area, determined by a bound on the BER, and taking into account the degradation due to the insertion of an echo in a dominant line of sight environment. The results are compared with those obtained when the coverage area is defined in capacity terms, and regardless of the degradation caused by the secondary replica of the primary message.
}, keywords = {cognitive radio, dynacs}, doi = {10.1109/SPAWC.2012.6292889}, author = {Alberto Rico-Alvari{\~n}o and C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {635, title = {Overlay Spectrum Reuse in a Multicarrier Broadcast Network: Single Receiver Analysis}, booktitle = {The 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2012)}, year = {2012}, address = {Cesme, Turkey}, abstract = {The overlay cognitive radio paradigm presents a framework where a secondary user exploits the knowledge of the primary user{\textquoteright}s message to improve spectrum utilization. A multicarrier broadcast network is one of the scenarios where this knowledge is possible: the secondary user could join a single frequency network and, therefore, gain access to the primary message. However, if the primary signal is received with a strong line of sight component, its relaying from the secondary transmitter does not suffice to ensure the primary user quality of service. In this paper we study the scenario where a secondary transmitter maximizes its own transmission rate, keeping the quality of a primary receiver over a given threshold. The analytical results, based on bit error rate bounds, are verified by means of software simulations and hardware tests.
}, keywords = {cognitive radio, dynacs}, doi = {10.1109/SPAWC.2012.6292890}, author = {Alberto Rico-Alvari{\~n}o and C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {636, title = {Performance study of multiuser interference mitigation schemes for hybrid broadband multibeam satellite architectures}, journal = {EURASIP Journal on Wireless Communications and Networking}, volume = {2012}, year = {2012}, pages = {132}, issn = {1687-1499}, doi = {10.1186/1687-1499-2012-132}, url = {http://jwcn.eurasipjournals.com/content/2012/1/132}, author = {Arnau, Jesus and Bertrand Devillers and C. Mosquera and Ana P{\'e}rez-Neira} } @conference {722, title = {Understanding statistical disclosure: A least squares approach}, booktitle = {Privacy Enhancing Technologies Symposium (PETS)}, year = {2012}, month = {07/2012}, pages = {38{\textendash}57}, address = {Vigo, Spain}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Carmela Troncoso} } @conference {Rico2011, title = {On the Co-existence of Primary and Secondary Transmitters in a Broadcast Network}, booktitle = {International Conference on Cognitive Radio and Advanced Spectrum Management}, year = {2011}, address = {Barcelona, Catalonia, Spain}, keywords = {Broadcast, cognitive radio, Overlay, Single Frequency Network}, author = {Alberto Rico-Alvari{\~n}o and C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {VazquezValcarceICASSP11, title = {Detection diversity of multiantenna spectrum sensors}, booktitle = {IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP 2011)}, year = {2011}, month = {05/2011}, pages = {2936-2939}, publisher = {IEEE}, organization = {IEEE}, address = {Prague, Czech Republic}, abstract = {A common type of digital image forgery is the duplication of a region in the same image to conceal something in a captured scene. The detection of region duplication forgeries has been recently addressed using methods based on SIFT features that provide points of the regions involved in the tampering and also the parameters of the geometric transformation between both regions. However, considering this output, there is not yet any information about which of the regions are originals and which are the duplicated ones. A reliable image forensic analysis must provide this information. In this paper, we propose to use a resampling-based method to provide an accurate way to distinguish the original and the tampered regions by analizing the resampling factor of each area. Comparative results are presented to evaluate the performance of the combination of both methods.
\
}, keywords = {Image forensics, region duplication, resampling estimation, SIFT}, doi = {10.1007/978-3-642-32205-1_25}, author = {David V{\'a}zquez-Pad{\'\i}n and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {ScagliolaTCOM11, title = {Gain-Invariant Dirty Paper Coding for Hierarchical OFDM}, journal = {IEEE Transactions on Communications}, volume = {59}, number = {12}, year = {2011}, month = {December}, pages = {3323-3334}, abstract = {A novel approach is here presented to superimpose a low-priority data stream on a high-priority data stream for OFDM systems. The main improvement with respect to conventional hierarchical modulation, which is included with the same purpose in various wireless technologies, is that the low-priority data stream can be decoded from the received subcarrier symbols without any previous equalization for multipath fading channels. As a consequence, the expected performance is nearly invariant of the channel estimation method used to equalize the channel. The low-priority stream is inserted adopting a gain-invariant dirty paper coding based on Rational Dither Modulation, which was proposed for data hiding applications. In this paper an analysis of the developed system is presented and several simulations have been carried out using DVB-T system parameters to verify the validity of the proposed approach. The experimental results show the better performance of the proposed method with respect to that of a conventional hierarchical modulation, particularly when the accuracy of the estimated channel response decreases.
}, keywords = {dirty paper, dynacs, Hierarchical OFDM, watermarking}, issn = {0090-6778}, doi = {10.1109/TCOMM.2011.101011.100544}, author = {Scagliola, Michele and Fernando P{\'e}rez-Gonz{\'a}lez and Guccione, Pietro} } @conference {Arna1112:Hybrid, title = {Hybrid Space-Ground Processing for High-Capacity Multi-beam Satellite Systems}, booktitle = {IEEE GLOBECOM}, year = {2011}, note = {Selected Areas in Communications Symposium - Satellite \& Space Communications Track (GC{\textquoteright}11 - SAC - SSC)}, month = {dec}, address = {Houston, Texas, USA}, author = {Arnau, Jesus and Michael Bergmann and Enzo Alberto Candreva and Giovanni Emanuele Corazza and Riccardo {De Gaudenzi} and Bertrand Devillers and Wilfried Gappmair and Francesco Lombardo and C. Mosquera and Ana P{\'e}rez-Neira and Ilaria Thibault and Alessandro Vanelli-Coralli} } @conference {Devi1112:Joint, title = {Joint Linear Precoding and Beamforming for the Forward Link of Multi-Beam Broadband Satellite Systems}, booktitle = {IEEE GLOBECOM}, year = {2011}, note = {Selected Areas in Communications Symposium - Satellite \& Space Communications Track (GC{\textquoteright}11 - SAC - SSC)}, address = {Houston, Texas, USA}, author = {Bertrand Devillers and Ana Isabel Perez and C. Mosquera} } @conference {Pineiro-SPIE2011, title = {A new method for perspective correction of document images}, booktitle = {Document Recognition and Retrieval}, series = {Proc. of SPIE}, volume = {7874}, year = {2011}, month = {January}, pages = {787410}, publisher = {SPIE}, organization = {SPIE}, address = {San Francisco, CA}, keywords = {Document image, perspective distortion correction, watermarking}, author = {Jos{\'e} Rodr{\'\i}guez-Pi{\~n}eiro and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez and Alberto Malvido} } @conference {658, title = {Prefilter Design for Forensic Resampling Estimation}, booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)}, year = {2011}, month = {12/2011}, pages = {1-6}, publisher = {IEEE}, organization = {IEEE}, address = {Foz do Igua{\c c}u, Brazil}, abstract = {Starting from a theoretical analysis of the resampling estimation problem for image tampering detection, this work presents a study, based on cyclostationarity theory, about the use of prefilters to improve the estimation accuracy of the resampling factor. Considering the methods that perform the estimation by analyzing the spectrum of the covariance of a resampled region, we propose an analytical framework that allows the definition of a cost function that measures the degree of detectability of the spectral peaks. Based on this measure, the design of the optimum prefilters for a particular resampling factor can be solved numerically. Experimental results validate the developed analysis and illustrate the enhancement of the performance in a real scenario.
}, doi = {10.1109/WIFS.2011.6123133}, author = {David V{\'a}zquez-Pad{\'\i}n and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {troncosoTIFS2011, title = {Secure Adaptive Filtering}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {6}, number = {2}, year = {2011}, month = {June}, pages = {469 -485}, keywords = {adaptive signal processing, computational complexity, cryptography, digital data protection, encrypted domain, homomorphic encryption systems, least mean squares algorithm, least mean squares methods, privacy, secure adaptive filtering, security, signal privacy preservation, SPED techniques, watermarking}, doi = {10.1109/TIFS.2011.2109385}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {Comesana-ICASSP2011, title = {Weber{\textquoteright}s law-based side-informed data hiding}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, year = {2011}, month = {May}, pages = {1840-1843}, address = {Prague, Czech Republic}, keywords = {data hiding, Logarithmic watermarking, Perceptually shaped watermarks, watermarking, Weber{\textquoteright}s law}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {pcomesan-iwdw11, title = {Witsenhausen{\textquoteright}s counterexample and its links with multimedia security problems}, booktitle = {International Workshop on Digital Watermarking (IWDW)}, year = {2011}, month = {October}, address = {Atlantic City, USA}, keywords = {control, Multimedia security, Witsenhausen{\textquoteright}s counterexample}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez and Chaouki T. Abdallah} } @conference {troncosoCISE10, title = {CryptoDSPs for Cloud Privacy}, booktitle = {International Workshop on Cloud Information System Engineering (CISE)}, series = {LNCS}, volume = {6724}, year = {2010}, month = {December}, address = {Hong Kong, China}, keywords = {cloud, privacy, security, watermarking}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {ShebaroDRFWS2010, title = {Leaving Timing Channel Fingerprints in Hidden Service Log Files}, journal = {Digital Investigation}, year = {2010}, note = {doi:10.1016/j.diin.2010.05.013}, keywords = {data-hiding, fingerprints, hidden services, timestamps, timing channel, tor network, watermarking}, author = {Bilal Shebaro and Fernando P{\'e}rez-Gonz{\'a}lez and Jedidiah R. Crandall} } @conference {ShebaroElsevier2010, title = {Leaving Timing Channel Fingerprints in Hidden Service Log Files}, booktitle = {Digital Forensic Research Workshop Annual Conference (DFRWS)}, year = {2010}, month = {August}, address = {Portland, Oregon}, keywords = {data hiding, fingerprints, hidden services, timestamps, timing channel, tor network, watermarking}, author = {Bilal Shebaro and Fernando P{\'e}rez-Gonz{\'a}lez and Jedidiah R. Crandall} } @conference {troncosoicassp09, title = {A new model for Gabor Coefficients{\textquoteright} Magnitude in Face Recognition}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, year = {2010}, month = {March}, publisher = {IEEE}, organization = {IEEE}, address = {Dallas, USA}, keywords = {Gabor coefficients, generalized Gaussian, Magnitude, Quantization, Statistical Model, watermarking}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Daniel Gonz{\'a}lez-Jim{\'e}nez and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {dalgaard-icip10, title = {On the Role of Differentiation for Resampling Detection}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2010}, month = {September}, publisher = {IEEE}, organization = {IEEE}, address = {Hong Kong, China}, keywords = {cyclostationarity, Image forensics, interpolation, prefiltering, resampling detection, watermarking}, author = {Nahuel Dalgaard and C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {troncosovph10, title = {Secure and Private Medical Clouds using Encrypted Processing}, booktitle = {Virtual Physiological Human (VPH)}, year = {2010}, month = {October}, address = {Brussels, Belgium}, keywords = {cloud, privacy, security, watermarking}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {dvazquez-icip10, title = {Two-dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2010}, month = {09/2010}, pages = {1745-1748}, publisher = {IEEE}, organization = {IEEE}, address = {Hong Kong, China}, abstract = {In this work, we study the presence of almost cyclostationary fields in images for the detection and estimation of digital forgeries. The almost periodically correlated fields in the two-dimensional space are introduced by the necessary interpolation operation associated with the applied spatial transformation. In this theoretical context, we extend a statistical time-domain test for presence of cyclostationarity to the two-dimensional space. The proposed method allows us to estimate the scaling factor and the rotation angle of resized and rotated images, respectively. Examples of the output of our method are shown and comparative results are presented to evaluate the performance of the two-dimensional extension.
}, keywords = {cyclostationarity, Image forensics, interpolation, resampling factor estimation, spatial transformation, watermarking}, doi = {10.1109/ICIP.2010.5652513}, author = {David V{\'a}zquez-Pad{\'\i}n and C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {Freire2009:WIFS, title = {Blind decoder for binary probabilistic traitor tracing codes}, booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)}, year = {2009}, month = {6-9 December}, pages = {56-60}, address = {London, UK}, keywords = {collusion, information theory, Tardos, Traitor tracing, watermarking}, author = {Luis P{\'e}rez-Freire and Teddy Furon} } @conference {Furon2009:EM, title = {EM decoding of Tardos traitor tracing codes}, booktitle = {ACM Workshop on Multimedia and Security (MMSEC)}, year = {2009}, month = {7-8 September}, address = {Princeton, NJ, USA}, keywords = {collusion channel, Expectation-Maximization, iterative decoding, Tardos code, Traitor tracing, watermarking}, author = {Teddy Furon and Luis P{\'e}rez-Freire} } @conference {IH09, title = {Estimating the minimal length of Tardos code}, booktitle = {International Workshop on Information Hiding (IH)}, series = {Lecture Notes in Computer Science}, year = {2009}, month = {7-10 June}, address = {Darmstadt, Germany}, keywords = {Fingerprinting, Rare event, Tardos code, Traitor tracing, watermarking}, author = {Teddy Furon and Luis P{\'e}rez-Freire and Arnaud Guyader and Fr{\'e}d{\'e}ric C{\'e}rou} } @conference {wifs09, title = {AN EXTENDED ANALYSIS OF DISCRETE FOURIER TRANFORM - RATIONAL DITHER MODULATION FOR NON-WHITE HOSTS}, booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)}, year = {2009}, month = {December}, publisher = {IEEE}, organization = {IEEE}, address = {London, U.K.}, keywords = {data hiding, dither modulation, filtering, non-white Gaussian hosts, watermarking}, author = {Scagliola, Michele and Fernando P{\'e}rez-Gonz{\'a}lez and Guccione, Pietro} } @article {scagliojis09, title = {High-rate data-hiding robust to linear filtering for colored hosts}, journal = {EURASIP Journal on Information Security}, year = {2009}, keywords = {data-hiding, rational dither modulation, watermarking}, author = {Scagliola, Michele and Fernando P{\'e}rez-Gonz{\'a}lez and Guccione, Pietro} } @conference {spieei09, title = {Model-based steganalysis using invariant features}, booktitle = {Media Forensics and Security}, year = {2009}, month = {January}, address = {San Jose, CA, U.S.A.}, keywords = {Invariant features, Model-based, Steganalysis}, author = {Tu-Thach Quach and Fernando P{\'e}rez-Gonz{\'a}lez and Gregory L. Heileman} } @conference {dgonzalez-icip09, title = {Modeling Magnitudes of Gabor Coefficients: The \β-Rayleigh Distribution}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2009}, month = {November}, publisher = {IEEE}, organization = {IEEE}, address = {Cairo, Egypt}, keywords = {Gabor, generalized Gaussian, Rayleigh, watermarking}, author = {Daniel Gonz{\'a}lez-Jim{\'e}nez and Enrique Argones-R{\'u}a and Fernando P{\'e}rez-Gonz{\'a}lez and Jos{\'e} Luis Alba-Castro} } @conference {dominguezicip09, title = {Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2009}, month = {November}, address = {Cairo, Egypt}, keywords = {cryptography, error statistics, false negative probabilities, false positive probabilities, Fridrich-Goljan self-embedding authentication method, hash bit errors, image authentication method, image coding, message authentication, performance analysis, robust hashing, watermarking}, author = {Gabriel Dom{\'\i}nguez-Conde and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {domingueztifs09, title = {Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {4}, number = {3}, year = {2009}, month = {Sept.}, pages = {570-577}, keywords = {cryptography, error statistics, false negative probabilities, false positive probabilities, Fridrich-Goljan self-embedding authentication method, hash bit errors, image authentication method, image coding, message authentication, performance analysis, robust hashing, watermarking}, author = {Gabriel Dom{\'\i}nguez-Conde and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {speed09, title = {Secure Direct and Iterative Protocols for Solving Systems of Linear Equations}, booktitle = {Signal Processing in the Encrypted Domain (SPEED) Workshop}, year = {2009}, month = {September}, pages = {122{\textendash}141}, address = {Lausanne, Switzerland}, keywords = {iterative protocol, privacy, security, systems of linear equations, watermarking}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {icip09, title = {Skewed Log-Stable model for natural images pixel block-variance}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2009}, month = {November}, publisher = {IEEE}, organization = {IEEE}, address = {Cairo, Egypt}, keywords = {Doubly stochastic model, Image block-variance, Log-stable distribution, Lognormal distribution, watermarking}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {tifs08ss-security, title = {Spread spectrum watermarking security}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {4}, number = {1}, year = {2009}, month = {March}, pages = {2-24}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {drm09, title = {Videosurveillance and privacy: covering the two sides of the mirror with DRM}, booktitle = {ACM Workshop on Digital Rights Management (DRM)}, year = {2009}, month = {November}, publisher = {ACM}, organization = {ACM}, address = {Chicago, IL, USA}, keywords = {access control, privacy, rights management, security, videosurveillance, watermarking}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {Furon2009:WCA, title = {Worst case attacks against binary probabilistic traitor tracing codes}, booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)}, year = {2009}, month = {6-9 December}, pages = {46-50}, address = {London, UK}, keywords = {collusion, information theory, Tardos, Traitor tracing, watermarking}, author = {Teddy Furon and Luis P{\'e}rez-Freire} } @mastersthesis {Freire08thesis, title = {Digital Watermarking Security}, year = {2008}, school = {University of Vigo, Spain}, type = {phd}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire} } @conference {ih08, title = {Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding}, booktitle = {International Workshop on Information Hiding (IH)}, year = {2008}, month = {May}, address = {Santa Barbara, CA, U.S.A.}, keywords = {data hiding, Distortion Optimization, Secure Embedding}, author = {Benjamin Mathon and Patrick Bas and Fran{\c c}ois Cayre and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {PerezMosqueraTIFS08, title = {Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {3}, number = {2}, year = {2008}, month = {June}, pages = {137-152}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera} } @article {VilaForcen08TDHMS, title = {Quantization-Based Methods: Additive Attacks Performance Analysis}, journal = {Transactions on Data Hiding and Multimedia Security III}, volume = {4920}, year = {2008}, pages = {70-90}, keywords = {data-hiding, watermarking}, author = {Jose Emilio Vila-Forc{\'e}n and Sviatoslav Voloshynovskiy and Oleksiy Koval and Fernando P{\'e}rez-Gonz{\'a}lez and Thierry Pun} } @article {tifs08dcdm, title = {Security of lattice-based data hiding against the Watermarked Only Attack}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {3}, number = {4}, year = {2008}, month = {December}, pages = {593-610}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {icip07benford, title = {Benford{\textquoteright}s Law in Image Processing}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2007}, month = {September}, address = {San Antonio, TX, USA}, keywords = {benford, benford{\textquoteright}s-law}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Gregory L. Heileman and Chaouki T. Abdallah} } @article {jis07bows, title = {Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks}, journal = {EURASIP Journal on Information Security}, volume = {2007}, number = {2}, year = {2007}, note = {Vol 2007, Article ID 25308, 8 pages. doi:10.1155/2007/25308. Source code available here}, month = {February}, keywords = {data-hiding, oracle, sensitivity, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {acm07pedro, title = {On the capacity of stegosystems}, booktitle = {ACM Workshop on Multimedia and Security (MMSEC)}, year = {2007}, month = {September}, pages = {1261-1264}, address = {Dallas, TX, USA}, keywords = {data-hiding, steganography, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @book {Artes07book, title = {Comunicaciones Digitales}, year = {2007}, month = {May}, publisher = {Pearson - Prentice Hall}, organization = {Pearson - Prentice Hall}, author = {Antonio Art{\'e}s-Rodr{\'\i}guez and Fernando P{\'e}rez-Gonz{\'a}lez and Jes{\'u}s Cid-Sueiro and R. L{\'o}pez-Valcarce and C. Mosquera and Fernando P{\'e}rez-Cruz} } @inbook {Mosquera07sat, title = {Digital Satellite Communications}, year = {2007}, publisher = {Springer}, organization = {Springer}, chapter = {Parameter Estimation and Synchronization}, author = {C. Mosquera and M. L. Boucheret and M. Bousquet and S. Cioni and Wilfried Gappmair and R. Pedone and Sandro Scalise and P. Skoutaridis and M. Villanti} } @inbook {Pedone07sat, title = {Digital Satellite Communications}, year = {2007}, publisher = {Springer}, organization = {Springer}, chapter = {Theoretical Background}, author = {R. Pedone and G. Albertazzi and P.T. Mathiopoulos and C. Mosquera and N. Sagias and M. Villanti} } @conference {wacha07, title = {Disclosing secrets in watermarking and data hiding}, booktitle = {Third Wavila Challenge (WaCha)}, series = {ECRYPT proceedings series from the Otto-von-Guericke University, Magdeburg, Germany}, year = {2007}, month = {14 June}, address = {Saint-Malo, France}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {spie07:dist-measures, title = {On Distortion Measures Associated to Random Desynchronization Attacks}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, year = {2007}, month = {January}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, desynchronization, watermarking}, author = {F{\'e}lix Balado and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Edward J. Delp and Ping W. Wong} } @conference {iwdw07pedro, title = {Dither modulation in the logarithmic domain}, booktitle = {International Workshop on Digital Watermarking (IWDW)}, year = {2007}, month = {December}, pages = {1261-1264}, address = {Guangzhou, China}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {spie07:zero-knowledge, title = {Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, year = {2007}, month = {January}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, sensitivity, watermarking, zero-knowledge}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Edward J. Delp and Ping W. Wong} } @article {zkwd-eurasipjis-sped07, title = {Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks}, journal = {EURASIP Journal on Information Security}, year = {2007}, note = {Special Issue on Signal Processing in the Encrypted Domain}, keywords = {data-hiding, sensitivity, watermarking, zero-knowledge}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {ih07, title = {Exploiting security holes in lattice data hiding}, booktitle = {International Workshop on Information Hiding (IH)}, series = {Lecture Notes in Computer Science}, year = {2007}, month = {11-13 June}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, address = {Saint-Malo, France}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {ecc07benford, title = {A Generalization of Benford{\textquoteright}s Law and Its Application to Images}, booktitle = {European Control Conference (ECC)}, year = {2007}, month = {July}, address = {Kos, Greece}, keywords = {benford, benford{\textquoteright}s-law}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Gregory L. Heileman and Chaouki T. Abdallah} } @conference {icip07dani, title = {Modeling Gabor coefficients via Generalized Gaussian Distributions for face recognition}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2007}, month = {September}, pages = {1261-1264}, address = {San Antonio, TX, USA}, keywords = {biometrics, face-recognition}, author = {Daniel Gonz{\'a}lez-Jim{\'e}nez and Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Jos{\'e} Luis Alba-Castro} } @conference {spie07:auth, title = {A Novel Interpretation of Content Authentication}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, year = {2007}, month = {January}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {authentication, data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and F{\'e}lix Balado and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Edward J. Delp and Ping W. Wong} } @booklet {Freire07report, title = {Practical estimators of the secret spreading vector for Improved Spread Spectrum modulations. Statistical analysis and results}, year = {2007}, month = {November}, publisher = {Signal Theory and Communications Department, University of Vigo, Spain}, type = {Internal report}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire} } @conference {Reproducible07, title = {Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {4}, year = {2007}, month = {April}, pages = {1261-1264}, address = {Honolulu, HW, USA}, keywords = {data-hiding, watermarking}, author = {Mauro Barni and Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a and Guido Bartoli} } @conference {MosqueraIWSSC07, title = {Satellite Communications: Research Trends and Open Issues}, booktitle = {International Workshop on Satellite and Space Communications (IWSSC)}, year = {2007}, keywords = {satellite communications}, author = {Alessandro Vanelli-Coralli and Giovanni Emanuele Corazza and G.K. Karagiannidis and P.T. Mathiopoulos and D.S. Michalopoulos and C. Mosquera and S. Papaharalabos and Sandro Scalise} } @conference {spie07:security, title = {Security of Spread-Spectrum-Based Data Hiding}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, year = {2007}, month = {January}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Pierre Moulin and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Edward J. Delp and Ping W. Wong} } @conference {icip07boato, title = {Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2007}, month = {September}, pages = {1261-1264}, address = {San Antonio, TX, USA}, keywords = {watermarking}, author = {G. Boato and C. Fontanari and F. G. B. De Natale and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {spie07:bows, title = {Two different approaches for attacking BOWS}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, year = {2007}, month = {January}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {BOWS, data-hiding, sensitivity, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Edward J. Delp and Ping W. Wong} } @conference {icip07pedro, title = {On a watermarking scheme in the logarithmic domain and its perceptual advantages}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2007}, month = {September}, pages = {1261-1264}, address = {San Antonio, TX, USA}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {tifs06SCS, title = {An accurate analysis of scalar quantization-based data-hiding}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {1}, number = {1}, year = {2006}, month = {March}, pages = {80-86}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez and Sviatoslav Voloshynovskiy} } @conference {acm06:kma, title = {On achievable security levels for lattice data hiding in the Known Message Attack scenario}, booktitle = {ACM Workshop on Multimedia and Security (MMSEC)}, year = {2006}, month = {September}, pages = {68-79}, publisher = {ACM}, organization = {ACM}, address = {Geneva, Switzerland}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez and Teddy Furon} } @article {pis06:bnsa, title = {Blind Newton Sensitivity Attack}, journal = {IEE Proceedings on Information Security}, volume = {153}, number = {3}, year = {2006}, note = {To appear}, month = {September}, pages = {115-125}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {spie06:sensitivity, title = {The blind Newton senstivity attack}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2006}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Edward J. Delp and Ping W. Wong} } @article {tsp05dcdm, title = {On distortion-compensated Dither Modulation data-hiding with repetition coding}, journal = {IEEE Transactions on Signal Processing}, volume = {54}, number = {2}, year = {2006}, month = {February}, pages = {585-600}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez and F{\'e}lix Balado} } @conference {spie05:dftrdm, title = {High-rate quantization data hiding robust to arbitrary linear filtering attacks}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2006}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera and Marcos {\'A}lvarez-D{\'\i}az and Reginald Lagendijk}, editor = {Edward J. Delp and Ping W. Wong} } @article {spl06:cropping, title = {The impact of the cropping attack on scalar STDM data hiding}, journal = {IEEE Signal Processing Letters}, volume = {13}, number = {6}, year = {2006}, note = {To appear}, month = {June}, pages = {353-356}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {abrardo06, title = {Improving the performance of RDM watermarking by means of trellis coded quantisation}, journal = {IEE Proceedings on Information Security}, volume = {153}, number = {3}, year = {2006}, month = {September}, pages = {107-114}, keywords = {data-hiding, watermarking}, author = {Andrea Abrardo and Mauro Barni and Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera} } @conference {malvido06barcodes, title = {A novel model for the print-and-capture channel in 2D bar codes}, booktitle = {International Workshop on Multimedia Content Representation, Classification and Security}, series = {Lecture Notes in Computer Science}, volume = {4105}, year = {2006}, month = {September}, pages = {627-634}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, address = {Istambul, Turkey}, keywords = {bar-codes, visible-encryption}, author = {Alberto Malvido and Fernando P{\'e}rez-Gonz{\'a}lez and Armando Cousi{\~n}o}, editor = {Bilge Gunsel and Anil K. Jain and A. Murat Tekalp and B{\"u}lent Sankur} } @article {oleksiy06, title = {Robustness Improvement of Known-Host-State Watermarking Using Host Statistics}, journal = {Signal Processing}, volume = {86}, number = {5}, year = {2006}, month = {May}, pages = {1076-1088}, keywords = {data-hiding, watermarking}, author = {Oleksiy Koval and Sviatoslav Voloshynovskiy and Jose Emilio Vila-Forc{\'e}n and Fernando P{\'e}rez-Gonz{\'a}lez and Frederic Deguillaume and Thierry Pun} } @conference {spie06:sme, title = {Secret dither estimation in lattice-quantization data hiding: a set-membership approach}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2006}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a}, editor = {Edward J. Delp and Ping W. Wong} } @article {tifs06security, title = {Security of lattice-based data hiding against the Known Message Attack}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {1}, number = {4}, year = {2006}, month = {December}, pages = {421-439}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez and Teddy Furon and Pedro Comesa{\~n}a} } @article {uvigo:survey-sec, title = {Watermarking security: a survey}, journal = {Transactions on Data Hiding and Multimedia Security I}, volume = {4300}, year = {2006}, month = {October}, pages = {41-72}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Pedro Comesa{\~n}a and Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {acm06zk, title = {Zero-Knowledge watermark detector robust to sensitivity attacks}, booktitle = {ACM Workshop on Multimedia and Security (MMSEC)}, year = {2006}, month = {September}, pages = {97-107}, publisher = {ACM}, organization = {ACM}, address = {Geneva, Switzerland}, keywords = {data-hiding, watermarking, zero-knowledge}, author = {Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {spie05:dpc, title = {Applying Erez and Ten Brink{\textquoteright}s Dirty Paper Codes to Data-Hiding}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2005}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez and Frans M. J. Willems}, editor = {Edward J. Delp and Ping W. Wong} } @conference {spie05:security, title = {Detection in quantization-based watermarking: performance and security issues}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2005}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Edward J. Delp and Ping W. Wong} } @conference {spie05:rdm, title = {Ensuring Gain Invariance in High-Rate Data-Hiding}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2005}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera and Mauro Barni and Andrea Abrardo}, editor = {Edward J. Delp and Ping W. Wong} } @conference {ih05_fundamentals, title = {Fundamentals of data hiding security and their application to spread-spectrum analysis}, booktitle = {International Workshop on Information Hiding (IH)}, series = {Lecture Notes in Computer Science}, volume = {3727}, year = {2005}, month = {June}, pages = {131-145}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, address = {Barcelona, Spain}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Mauro Barni and Jordi Herrera-Joancomart{\'\i} and Stefan Katzenbeisser and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {ih05_sideinformed, title = {Information-theoretic analysis of security in side-informed data hiding}, booktitle = {International Workshop on Information Hiding (IH)}, series = {Lecture Notes in Computer Science}, volume = {3727}, year = {2005}, note = {6-8 June}, pages = {131-145}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Mauro Barni and Jordi Herrera-Joancomart{\'\i} and Stefan Katzenbeisser and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {wiamis05, title = {An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios}, booktitle = {International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS)}, year = {2005}, month = {April}, address = {Montreux, Switzerland}, keywords = {data-hiding, security, watermarking}, author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:tsp-rdm, title = {Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks}, journal = {IEEE Transactions on Signal Processing}, volume = {53}, number = {10}, year = {2005}, note = {Third supplement on secure media}, month = {October}, pages = {3960-3975}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera and Mauro Barni and Andrea Abrardo} } @conference {iwdw05, title = {The return of the sensitivity attack}, booktitle = {International Workshop on Digital Watermarking (IWDW)}, series = {Lecture Notes in Computer Science}, volume = {3710}, year = {2005}, month = {September}, pages = {260-274}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, address = {Siena, Italy}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and H. J. Kim} } @conference {cms05, title = {On reversibility of random binning techniques: multimedia perspectives}, booktitle = {Conference on Communications and Multimedia Security (CMS)}, series = {Lecture Notes in Computer Science}, year = {2005}, month = {September}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, address = {Salzburg, Austria}, keywords = {data-hiding, watermarking}, author = {Sviatoslav Voloshynovskiy and Oleksiy Koval and E. Topak and Jose Emilio Vila-Forc{\'e}n and Pedro Comesa{\~n}a and Thierry Pun} } @conference {spie05:dzq, title = {Robustness Improvement of Known-Host-State Watermarking Using Host Statistics}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2005}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, watermarking}, author = {Oleksiy Koval and Sviatoslav Voloshynovskiy and Frederic Deguillaume and Fernando P{\'e}rez-Gonz{\'a}lez and Thierry Pun}, editor = {Edward J. Delp and Ping W. Wong} } @conference {spie05:scs, title = {Spread-spectrum vs. quantization-based data hiding: misconceptions and implications}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2005}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, watermarking}, author = {Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Edward J. Delp and Ping W. Wong} } @conference {spie05:wca, title = {Worst case additive attack against quantization-based data-hiding methods}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2005}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, watermarking}, author = {Jose Emilio Vila-Forc{\'e}n and Sviatoslav Voloshynovskiy and Oleksiy Koval and Fernando P{\'e}rez-Gonz{\'a}lez and Thierry Pun}, editor = {Edward J. Delp and Ping W. Wong} } @conference {uvigo:bias, title = {Bias analysis and removal of a microphone array based road traffic speed estimator}, booktitle = {European Signal Processing Conference (EUSIPCO)}, year = {2004}, address = {Vienna, Austria}, keywords = {microphone arrays, speed estimation, traffic monitoring}, author = {R. L{\'o}pez-Valcarce and D. Hurtado and C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {spie04EM, title = {Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2004}, month = {January}, pages = {805-815}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, watermarking}, author = {F{\'e}lix Balado and Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a}, editor = {Edward J. Delp and Ping W. Wong} } @conference {wiamis04:turbodec, title = {Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation}, booktitle = {International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS)}, year = {2004}, month = {April}, address = {Lisboa}, keywords = {data-hiding, watermarking}, author = {F{\'e}lix Balado and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:speedestjnl, title = {Estimation of road vehicle speed using two omnidirectional microphones: a maximum likelihood approach}, journal = {EURASIP Journal of Applied Signal Processing}, volume = {2004}, number = {8}, year = {2004}, month = {August}, pages = {1059{\textendash}1077}, keywords = {microphone arrays, speed estimation, traffic monitoring}, author = {R. L{\'o}pez-Valcarce and C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {wiamis04:dm, title = {Improved Binary Dither-Modulation with perceptual constraints}, booktitle = {International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS)}, year = {2004}, month = {April}, address = {Lisboa, Portugal}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a} } @conference {spie04, title = {Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5306}, year = {2004}, month = {January}, pages = {592-601}, publisher = {SPIE}, organization = {SPIE}, address = {San Jose, California, USA}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Edward J. Delp and Ping W. Wong} } @conference {acm04, title = {Quantization-based watermarking performance improvement using host statistics: additive noise attack}, booktitle = {ACM Workshop on Multimedia and Security (MMSEC)}, year = {2004}, month = {September 20-21}, address = {Magdeburg, Germany}, author = {Oleksiy Koval and Sviatoslav Voloshynovskiy and Fernando P{\'e}rez-Gonz{\'a}lez and Frederic Deguillaume and Thierry Pun} } @conference {mmsp04:rdm, title = {Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks}, booktitle = {IEEE International Workshop on Multimedia Signal Processing}, year = {2004}, month = {29 Sept - 1 Oct}, pages = {139-142}, address = {Siena, Italy}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Mauro Barni and Andrea Abrardo and C. Mosquera} } @conference {mmsp04:scs, title = {Revealing the true achievable rates of Scalar Costa Scheme}, booktitle = {IEEE International Workshop on Multimedia Signal Processing}, year = {2004}, month = {29 Sept - 1 Oct}, pages = {203-206}, address = {Siena, Italy}, keywords = {data-hiding, watermarking}, author = {Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez and Sviatoslav Voloshynovskiy} } @conference {eusipco04, title = {Spread Spectrum Watermarking for Real Images: Is Everything So Hopeless?}, booktitle = {European Signal Processing Conference (EUSIPCO)}, year = {2004}, month = {September 6-10}, address = {Vienna, Austria}, author = {Oleksiy Koval and Sviatoslav Voloshynovskiy and Fernando P{\'e}rez-Gonz{\'a}lez and Frederic Deguillaume and Thierry Pun} } @conference {mmsp04:worstcase, title = {Worst case additive attack against quantization-based watermarking techniques}, booktitle = {IEEE International Workshop on Multimedia Signal Processing}, year = {2004}, month = {29 Sept - 1 Oct}, pages = {135-138}, address = {Siena, Italy}, author = {Jose Emilio Vila-Forc{\'e}n and Sviatoslav Voloshynovskiy and Oleksiy Koval and Thierry Pun and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {icip03a, title = {Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2003}, publisher = {IEEE}, organization = {IEEE}, address = {Barcelona, Spain}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a and F{\'e}lix Balado} } @conference {uvigo:hexagonal, title = {Hexagonal Quantizers are not Optimal for 2-D Data Hiding}, booktitle = {Security and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5020}, year = {2003}, month = {jan}, address = {Santa Clara, USA}, keywords = {data-hiding, watermarking}, author = {F{\'e}lix Balado and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Ping W. Wong and Edward J. Delp} } @conference {iwdw03:invited, title = {The Importance of aliasing in structured quantization index modulation data hiding (invited lecture)}, booktitle = {International Workshop on Digital Watermarking (IWDW)}, series = {Lecture Notes in Computer Science}, volume = {2939 / 2004}, year = {2003}, month = {October}, pages = {1-17}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {iwdw03, title = {Optimal Data-Hiding Strategies for Games with BER Payoffs}, booktitle = {International Workshop on Digital Watermarking (IWDW)}, series = {Lecture Notes in Computer Science}, volume = {2939 / 2004}, year = {2003}, month = {October}, pages = {101-116}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez and F{\'e}lix Balado}, editor = {Ton Kalker and Ingemar J. Cox and Yong Man Ro} } @conference {icip03, title = {Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2003}, month = {sep}, publisher = {IEEE}, organization = {IEEE}, address = {Barcelona, Spain}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez and F{\'e}lix Balado} } @article {uvigo:existingandnew, title = {Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels}, journal = {IEEE Transactions on Signal Processing}, volume = {51}, number = {4}, year = {2003}, note = {Special Issue on Signal Processing for Data Hiding in Digital Media \& Secure Content Delivery}, pages = {960-980}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and F{\'e}lix Balado and Juan R. Hern{\'a}ndez} } @article {uvigo:subband, title = {Subband hyperstable adaptive IIR filters}, journal = {IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing}, volume = {50}, number = {7}, year = {2003}, month = {July}, pages = {383{\textendash}389}, keywords = {adaptive IIR filters, subband adaptive filters, system identification}, author = {R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:visible, title = {Visible Encryption: Using Paper as a Secure Channel}, booktitle = {Security and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {5020}, year = {2003}, address = {Santa Clara, USA}, keywords = {2-D-Bar-Codes, data-hiding, print-\&-scan, Two-dimensional-modulations, visible-encryption}, author = {Norberto Degara-Quintela and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Ping W. Wong and Edward J. Delp} } @article {uvigo:analysispilot, title = {Analysis of Pilot-Based Synchronization Algorithms for Watermarking of Still Images}, journal = {Signal Processing: Image Communication}, volume = {17}, number = {8}, year = {2002}, month = {September}, pages = {661-633}, keywords = {data-hiding, watermarking}, author = {Manuel Alvarez-Rodr{\'\i}guez and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:prewhitened, title = {Analysis of the prewhitened constant modulus cost function}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {3}, year = {2002}, pages = {2641-2644}, address = {Orlando, FL, USA}, keywords = {constant modulus, Digital Communications, equalization}, author = {R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:eigenvector, title = {Automatic delay selection in blind channel equalization: a prewhitening + eigenvector approach}, booktitle = {Asilomar Conference on Signals, Systems and Computers}, year = {2002}, address = {Pacific Grove, CA, USA}, keywords = {Digital Communications, equalization, higher-order statistics}, author = {R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:improvingdatahiding, title = {Improving Data Hiding Performance by Using Quantization in a Projected Domain}, booktitle = {IEEE International Conference on Multimedia and Expo (ICME)}, year = {2002}, month = {August}, address = {Lausanne, Switzerland}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and F{\'e}lix Balado} } @conference {uvigo:nothing, title = {Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation}, booktitle = {International Workshop on Information Hiding (IH)}, series = {Lecture Notes in Computer Science}, year = {2002}, month = {October}, publisher = {Springer-Verlag}, organization = {Springer-Verlag}, address = {Noorwijkerhout, The Netherlands}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and F{\'e}lix Balado} } @conference {uvigo:probably, title = {Provably or Probably Robust Data Hiding?}, booktitle = {IEEE International Conference on Multimedia and Expo (ICME)}, year = {2002}, month = {August}, address = {Lausanne, Switzerland}, keywords = {data-hiding, watermarking}, author = {F{\'e}lix Balado and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:quantized, title = {Quantized Projection Data Hiding}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2002}, month = {September}, address = {Rochester (NY), USA}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and F{\'e}lix Balado} } @conference {uvigo:speedest, title = {Road vehicle speed estimation from a two-microphone array}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {2}, year = {2002}, pages = {1321{\textendash}1324}, address = {Orlando, FL, USA}, keywords = {microphone arrays, speed estimation, traffic monitoring}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and R. L{\'o}pez-Valcarce and C. Mosquera} } @article {Mosquera01c, title = {Adaptive IIR Filters for Active Noise Control}, journal = {International Journal of Acoustics and Vibration}, volume = {6}, year = {2001}, pages = {3-10}, keywords = {ANC, IIR, SPR}, author = {C. Mosquera and J.A. G{\'o}mez and Fernando P{\'e}rez-Gonz{\'a}lez and M. Sobreira and E. Alexandre} } @article {uvigo:revisited, title = {Adaptive lattice IIR filtering revisited: convergence issues and new algorithms with improved stability properties}, journal = {IEEE Transactions on Signal Processing}, volume = {49}, number = {4}, year = {2001}, month = {April}, pages = {811{\textendash}821}, keywords = {adaptive IIR filters, lattice filters, system identification}, author = {R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:audio-wavelets, title = {An adaptive tiling of the time-frequency plane with application to multiresolution-based perceptive audio coding}, journal = {Signal Processing}, volume = {81/2}, year = {2001}, month = {March}, pages = {301-319}, author = {Nuria Gonz{\'a}lez-Prelcic and Antonio S. Pena} } @article {Mosquera01b, title = {Algebraic solution to the robust SPR problem for two polynomials}, journal = {Automatica}, volume = {37}, year = {2001}, month = {may}, keywords = {robust, SPR}, author = {C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:approaching, title = {Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications}, journal = {Signal Processing}, volume = {81}, number = {6}, year = {2001}, note = {Special Section on Information Theoretic Aspects of Digital Watermarking}, month = {June}, pages = {1215{\textendash}1238}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Juan R. Hern{\'a}ndez and F{\'e}lix Balado} } @conference {uvigo:samplelevel, title = {Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes}, booktitle = {Security and Watermarking of Multimedia Contents}, series = {Proc. of SPIE}, volume = {4314}, year = {2001}, month = {January}, pages = {532{\textendash}543}, address = {San Jos{\'e}, USA}, keywords = {data-hiding, watermarking}, author = {F{\'e}lix Balado and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Ping W. Wong and Edward J. Delp} } @article {uvigo:reinit01, title = {Efficient Reinitialization of the Prewhitened Constant Modulus Algorithm}, journal = {IEEE Communications Letters}, volume = {5}, number = {12}, year = {2001}, month = {December}, pages = {488{\textendash}490}, keywords = {constant modulus, Digital Communications, equalization}, author = {R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {Mosquera01a, title = {On the strengthened robust SPR problem for discrete-time systems}, journal = {Automatica}, volume = {37}, year = {2001}, month = {apr}, pages = {625-628}, keywords = {robust, SPR, strengthened}, author = {C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:turbocoding, title = {Turbo Coding for Sample-Level Watermarking in the DCT Domain}, booktitle = {IEEE International Conference on Image Processing (ICIP)}, year = {2001}, month = {October}, pages = {1003{\textendash}1006}, address = {Thessaloniki, Greece}, keywords = {data-hiding, watermarking}, author = {F{\'e}lix Balado and Fernando P{\'e}rez-Gonz{\'a}lez and Sandro Scalise} } @article {uvigo:equalization-wavelets, title = {Wavelet-packet-based subband adaptive equalization}, journal = {Signal Processing}, volume = {81}, number = {8}, year = {2001}, month = {August}, pages = {1641-1662}, author = {Nuria Gonz{\'a}lez-Prelcic and Fernando P{\'e}rez-Gonz{\'a}lez and M. Elena Dom{\'\i}nguez-Jim{\'e}nez} } @conference {icc00, title = {Analytical Bounds on the Error Performance of the DVB-T System in Time-Invariant Channels}, booktitle = {IEEE International Conference on Communications (ICC)}, year = {2000}, month = {June}, address = {New Orleans, LA, USA}, keywords = {Digital Communications, Digital Television, Rayleigh, Rice, Terrestrial}, author = {Jos{\'e} M. Lago and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:blindadaptive, title = {On blind adaptive algorithms for IIR equalizers}, booktitle = {IEEE Digital Signal Processing Workshop (DSP)}, year = {2000}, address = {Hunt, TX, USA}, keywords = {adaptive IIR filters, Digital Communications, equalization, second-order statistics}, author = {R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {Mosquera00, title = {Convergence analysis of the multiple-channel filtered-U recursive LMS algorithm for active noise control}, journal = {Signal Processing}, volume = {80}, year = {2000}, pages = {849-856}, keywords = {ANC, FuRLMS, SPR}, author = {C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:dctdomain, title = {DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure}, journal = {IEEE Transactions on Image Processing}, volume = {9}, number = {1}, year = {2000}, note = {Special Issue on Image and Video Processing for Digital Libraries}, month = {January}, pages = {55{\textendash}68}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Mart{\'\i}n Amado and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:improvingperformance, title = {Improving the Performance of Spatial Watermarking of Images Using Channel Coding}, journal = {Signal Processing}, volume = {80}, number = {7}, year = {2000}, month = {July}, pages = {1261-1279}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Jos{\'e} M. Rodr{\'\i}guez and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:misconvergence, title = {Misconvergence and stabilization of adaptive IIR lattice filters}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {1}, year = {2000}, pages = {65{\textendash}68}, address = {Istanbul, Turkey}, keywords = {adaptive IIR filters, lattice filters, system identification}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and R. L{\'o}pez-Valcarce} } @conference {bayona99, title = {BER Performance of the DVB-T System in Time-Invariant Channels}, booktitle = {Baiona Workshop on Emerging Technologies in Communications}, year = {1999}, month = {September}, pages = {230-235}, address = {Baiona-Vigo, Spain}, keywords = {Digital Communications, Digital Television, Rayleigh, Rice, Terrestrial}, author = {Jos{\'e} M. Lago and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:polyjnl, title = {Hyperstable adaptive IIR algorithms with polyphase structures: analysis and design}, journal = {IEEE Transactions on Signal Processing}, volume = {47}, number = {7}, year = {1999}, month = {July}, pages = {2043{\textendash}2046}, keywords = {adaptive IIR filters, system identification}, author = {R. L{\'o}pez-Valcarce and C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:polycnf, title = {Hyperstable polyphase adaptive IIR filters}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {4}, year = {1999}, pages = {1841{\textendash}1844}, address = {Phoenix, AZ, USA}, keywords = {adaptive IIR filters, system identification}, author = {C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez and R. L{\'o}pez-Valcarce} } @conference {Mosquera_Perez99, title = {IIR adaptive filters for active noise control}, booktitle = {International Congress on Sound and Vibration}, year = {1999}, address = {Copenhagen, Denmark}, keywords = {ANC, IIR, SPR}, author = {C. Mosquera and J.A. G{\'o}mez and Fernando P{\'e}rez-Gonz{\'a}lez and M. Sobreira} } @conference {uvigo:noveldetector, title = {Novel Detector Structures for Watermark Extraction in the DCT Domain}, booktitle = {Workshop on Nonlinear Signal and Image Processing}, year = {1999}, month = {June}, publisher = {IEEE-EURASIP}, organization = {IEEE-EURASIP}, address = {Antalya, Turkey}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Mart{\'\i}n Amado and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {Mosquera99, title = {The robust SPR problem: design algorithms and new applications}, journal = {Signal Processing}, volume = {76}, year = {1999}, pages = {269-283}, keywords = {robust, SPR}, author = {C. Mosquera and L. Leyra and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:remarks, title = {Some remarks on the lattice form of the Steiglitz-McBride iteration}, journal = {IEEE Signal Processing Letters}, volume = {6}, number = {11}, year = {1999}, month = {November}, pages = {290{\textendash}292}, keywords = {adaptive IIR filters, lattice filters, system identification}, author = {R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:statistical, title = {Statistical Analysis of Watermarking Schemes for Copyright Protection of Images}, journal = {Proc. of the IEEE}, volume = {87}, number = {7}, year = {1999}, note = {Special Issue on Identification and Protection of Multimedia Information}, month = {July}, pages = {1142{\textendash}1166}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:atutorial, title = {A Tutorial on Digital Watermarking}, booktitle = {IEEE Annual Carnahan Conference on Security Technology}, year = {1999}, month = {October}, address = {Madrid, Spain}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Juan R. Hern{\'a}ndez} } @conference {Prelcic99b, title = {Wavelet Packet based subband adaptive equalization}, booktitle = {Baiona Workshop on Emerging Technologies in Telecommunications}, year = {1999}, month = {September}, address = {Baiona, Spain}, author = {Nuria Gonz{\'a}lez-Prelcic and Fernando P{\'e}rez-Gonz{\'a}lez and M. Elena Dom{\'\i}nguez-Jim{\'e}nez} } @article {uvigo:autoregressive, title = {An adaptive recursive filter for autoregressive inputs}, journal = {International Journal of Adaptive Control and Signal Processing}, volume = {12}, year = {1998}, month = {September}, pages = {467{\textendash}494}, keywords = {adaptive IIR filters, lattice filters, system identification}, author = {R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {Mosquera98d, title = {An approach to the robust SPR problem through interpolation and avoidance: connections with the robust stability problem}, booktitle = {American Control Conference}, year = {1998}, keywords = {avoidance, interpolation, robust, SPR}, author = {C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {uvigo:notebias, title = {On the bias of the modified output error algorithm}, journal = {IEEE Transactions on Automatic Control}, volume = {43}, number = {9}, year = {1998}, month = {September}, pages = {1261{\textendash}1262}, keywords = {adaptive IIR filters, system identification}, author = {C. Mosquera and R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:codingandsynch, title = {Coding and Synchronization: A Boost and a Bottleneck for the Development of Image Watermarking}, booktitle = {COST $\#$254 Int. Workshop on Intelligent Communications}, year = {1998}, month = {June}, pages = {77{\textendash}82}, publisher = {SSGRR}, organization = {SSGRR}, address = {L{\textquoteright}Aquila, Italy}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Fernando P{\'e}rez-Gonz{\'a}lez and Jos{\'e} M. Rodr{\'\i}guez} } @conference {Mosquera98b, title = {Filtered error adaptive IIR algorithms and their application to active noise control}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, year = {1998}, keywords = {adaptive, IIR, SPR}, author = {C. Mosquera and J.A. G{\'o}mez and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {Prelcic98a, title = {A Flexible Structure for Wavelet Packet-based Subband Adaptive Equalization}, booktitle = {IEEE-SP International Symposium on Time-Frequency and Time-Scale Analysis}, year = {1998}, month = {October}, pages = {377{\textendash}380}, address = {Pittsburgh, USA}, author = {Nuria Gonz{\'a}lez-Prelcic and Fernando P{\'e}rez-Gonz{\'a}lez and A.B. Mosquera-Gonz{\'a}lez} } @conference {uvigo:theimpact, title = {The Impact of Channel Coding on the Performance of Spatial Watermarking for Copyright Protection}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {5}, year = {1998}, month = {May}, pages = {2973{\textendash}2976}, address = {Seattle, Washington, USA}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Fernando P{\'e}rez-Gonz{\'a}lez and Jos{\'e} M. Rodr{\'\i}guez} } @conference {uvigo:improvingdctdomain, title = {Improving DCT-Domain Watermark Extraction Using Generalized Gaussian Models}, booktitle = {COST $\#$254 Int. Workshop on Intelligent Communications and Multimedia Terminals}, year = {1998}, month = {November}, pages = {23{\textendash}26}, address = {Ljubljana, Slovenia}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Fernando P{\'e}rez-Gonz{\'a}lez and Mart{\'\i}n Amado} } @article {uvigo:performance, title = {Performance Analysis of a 2D-Multipulse Amplitude Modulation Scheme for Data Hiding and Watermarking of Still Images}, journal = {IEEE Journal on Selected Areas in Communications}, volume = {16}, number = {4}, year = {1998}, month = {May}, pages = {510{\textendash}524}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Fernando P{\'e}rez-Gonz{\'a}lez and Jos{\'e} M. Rodr{\'\i}guez and Gustavo Nieto} } @inbook {Mosquera_Perez98d, title = {The Simultaneous Strict Positive Real Problem: Similarities with the Simultaneous Stability Problem and Applications in Adaptive Recursive Algorithms}, booktitle = {Mathematics in Signal Processing}, year = {1998}, pages = {139-148}, publisher = {Oxford University Press}, organization = {Oxford University Press}, keywords = {robust, SPR}, author = {C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {J.G. McWhirter and I.K. Proudler} } @conference {Mosquera98c, title = {On the strengthened robust SPR problem for discrete-time systems}, booktitle = {American Control Conference}, year = {1998}, author = {C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {Prelcic98b, title = {Testing a Flexible Time-Frequency Mapping for High Frequencies in TARCO (Tonal Adaptive Resolution COdec)}, booktitle = {Audio Engineering Society Convention (AES Convention)}, year = {1998}, note = {Preprint 4676 (P9-6)}, month = {May}, address = {Amsterdam, The Netherlands}, author = {Alejandro Casal and Carlos Serantes and Nuria Gonz{\'a}lez-Prelcic and Antonio S. Pena} } @conference {uvigo:throwing, title = {Throwing More Light on Image Watermarks}, booktitle = {International Workshop on Information Hiding (IH)}, series = {Lecture Notes in Computer Science}, volume = {1525}, year = {1998}, month = {April}, pages = {191{\textendash}207}, publisher = {Springer-Verlag}, organization = {Springer-Verlag}, address = {Portland, Oregon, USA}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {MosqueraPerez97b, title = {An Algorithm for Interpolation with Positive Rational Functions on the Imaginary Axis}, journal = {Automatica}, volume = {33}, year = {1997}, pages = {2277-2280}, keywords = {interpolation, SPR}, author = {C. Mosquera and Fernando P{\'e}rez-Gonz{\'a}lez} } @inbook {Mosquera_Perez97a, title = {Analysis and Synthesis Tools for Robust SPRness}, booktitle = {Intelligent methods in signal processing and communications}, year = {1997}, pages = {147-171}, publisher = {Birkhauser}, organization = {Birkhauser}, keywords = {robust, SPR}, author = {C. Mosquera and Juan R. Hern{\'a}ndez and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {A. Figueiras and D. Docampo and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:datahiding, title = {Data Hiding for Copyright Protection of Still Images}, booktitle = {Emerging Techniques for Communication Terminals}, year = {1997}, month = {July}, pages = {285{\textendash}289}, publisher = {ENSEEIHT}, organization = {ENSEEIHT}, address = {Tolouse, France}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Fernando P{\'e}rez-Gonz{\'a}lez and Jos{\'e} M. Rodr{\'\i}guez} } @conference {Prelcic97b, title = {A Fast Noise-Scaling Algorithm for Uniform Quantization in Audio Coding Schemes}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, year = {1997}, month = {May}, address = {Munich, Germany}, author = {Carlos Serantes and Antonio S. Pena and Nuria Gonz{\'a}lez-Prelcic} } @conference {Prelcic97a, title = {A Flexible Tiling of the Time Axis for Adaptive Wavelet Packet Audio Decompositions}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, year = {1997}, month = {May}, address = {Munich, Germany}, author = {Nuria Gonz{\'a}lez-Prelcic and Antonio S. Pena and Carlos Serantes} } @conference {Prelcic97c, title = {New Improvements in ARCO}, booktitle = {Audio Engineering Society Convention (AES Convention)}, year = {1997}, note = {Preprint 4419 (C-6)}, month = {March}, address = {Munich, Germany}, author = {Antonio S. Pena and Nuria Gonz{\'a}lez-Prelcic and Carlos Serantes} } @article {uvigo:newresults, title = {New results and theoretical analysis of the Master-Slave family of recursive identification algorithms}, journal = {Signal Processing}, volume = {58}, number = {1}, year = {1997}, month = {April}, pages = {79-94}, keywords = {adaptive IIR filters, lattice filters, system identification}, author = {R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {Prelcic96a, title = {An Adaptive Tree Search Algorithm with Application to Multiresolution-based Perceptive Audio Coding}, booktitle = {IEEE-SP International Symposium on Time-Frequency and Time-Scale Analysis}, year = {1996}, month = {June}, pages = {117{\textendash}120}, address = {Paris, France}, author = {Nuria Gonz{\'a}lez-Prelcic and Antonio S. Pena} } @conference {Prelcic96c, title = {ARCO (Adaptive Resolution COdec): A Hybrid Approach to Perceptual Audio Coding}, booktitle = {Audio Engineering Society Convention (AES Convention)}, year = {1996}, note = {Preprint 4178}, month = {May}, address = {Copenhagen, Denmark}, author = {Antonio S. Pena and Carlos Serantes and Nuria Gonz{\'a}lez-Prelcic} } @conference {Perez_Mosquera96, title = {Characterization and Algebraic Solution to the Extreme-Point Robust SPR Problem}, booktitle = {IFAC World Congress}, year = {1996}, pages = {391-396}, address = {San Francisco, CA, USA}, keywords = {robust, SPR}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera} } @conference {Prelcic96b, title = {Considerations on the Performance of Filter Design Methods for Wavelet Packet Audio Decompositions}, booktitle = {Audio Engineering Society Convention (AES Convention)}, year = {1996}, note = {Preprint 4235}, month = {May}, address = {Copenhagen, Denmark}, author = {Nuria Gonz{\'a}lez-Prelcic and S. Gonz{\'a}lez-S{\'a}nchez and Antonio S. Pena} } @conference {uvigo:masterslave, title = {The Master-Slave family of system identification algorithms: theoretical results and new structures}, booktitle = {IFAC World Congress}, volume = {J}, year = {1996}, month = {June}, pages = {185{\textendash}190}, publisher = {IFAC}, organization = {IFAC}, address = {San Francisco, CA, USA}, keywords = {adaptive IIR filters, lattice filters, system identification}, author = {R. L{\'o}pez-Valcarce and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {Perez_Mosquera95, title = {Algebraic LTI Filter Synthesis for Simultaneously Making a Convex Combination of Discrete-Time Plants SPR}, booktitle = {IEEE Conference on Decision and Control (CDC)}, year = {1995}, pages = {780-781}, address = {New Orleans, LA}, keywords = {robust, SPR}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera} }