@article {1069, title = {Information Forensics and Security: A quarter-century-long journey}, journal = {IEEE Signal Processing Magazine}, volume = {40}, year = {2023}, pages = {67-79}, keywords = {forensics, History, Information processing, Information security, Intellectual property, Machine Learning, privacy, Signal processing, Surveillance}, doi = {10.1109/MSP.2023.3275319}, url = {https://ieeexplore.ieee.org/document/10188887}, author = {Barni, Mauro and Campisi, Patrizio and Delp, Edward J. and Do{\"e}rr, Gwena{\"e}l and Fridrich, Jessica and Memon, Nasir and Fernando P{\'e}rez-Gonz{\'a}lez and Rocha, Anderson and Verdoliva, Luisa and Wu, Min} } @conference {1063, title = {Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies}, booktitle = {IEEE International Conference on Cyber Security and Resilience (CSR)}, year = {2023}, pages = {604-611}, publisher = {IEEE}, organization = {IEEE}, address = {Venice, Italy}, isbn = {979-8-3503-1170-9}, doi = {https://doi.org/10.1109/CSR57506.2023.10224961}, author = {Alberto Pedrouzo-Ulloa and Jan Ramon and Fernando P{\'e}rez-Gonz{\'a}lez and Siyanna Lilova and Patrick Duflot and Zakaria Chihani and Nicola Gentili and Paola Ulivi and Mohammad Ashadul Hoque and Twaha Mukammel and Zeev Pritzker and Augustin Lemesle and Jaime Loureiro-Acu{\~n}a and Xavier Mart{\'\i}nez and Gonzalo Jim{\'e}nez-Balsa} } @article {1016, title = {On the information leakage quantification of camera fingerprint estimates}, journal = {Eurasip Journal on Information Security}, volume = {2021}, year = {2021}, pages = {18}, doi = {https://doi.org/10.1186/s13635-021-00121-6}, url = {https://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-021-00121-6}, author = {Fern{\'a}ndez-Mendui{\~n}a, Samuel and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {970, title = {Improving PRNU Compression Through Preprocessing, Quantization, and Coding}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {14}, year = {2019}, month = {03/2019}, pages = {13}, chapter = {608}, author = {L. Bondi and P. Bestagini and Fernando P{\'e}rez-Gonz{\'a}lez and S. Tubaro} } @conference {881, title = {Image denoising in the encrypted domain}, booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)}, year = {2016}, month = {12/2016}, publisher = {IEEE}, organization = {IEEE}, address = {Abu Dhabi, UAE}, keywords = {compass, homomorphic processing, Image Denoising, Image Encryption, lattice cryptography}, author = {Alberto Pedrouzo-Ulloa and Juan Ram{\'o}n Troncoso-Pastoriza and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {842, title = {The impact of feeder link interference in multiple gateway multibeam satellite systems}, booktitle = {8th Advanced Satellite Multimedia Systems Conference 14th Signal Processing for Space Communications Workshop}, year = {2016}, month = {09/2016}, keywords = {compass, satcom}, author = {Vahid Joroughi and Carlos Mosquera} } @article {756, title = {Improving Area Coverage of Wireless Sensor Networks Via Controllable Mobile Nodes: a Greedy Approach}, journal = {Journal of Network and Computer Applications}, volume = {48}, year = {2015}, month = {02/2015}, pages = {1-13}, abstract = {
Reliable wide-area monitoring with Wireless Sensor Networks (WSNs) remains a problem of
interest: simply deploying more nodes to cover wider areas is generally not a viable solution, due to
deployment and maintenance costs and the increase in radio interference. One possible solution
gaining popularity is based on the use of a reduced number of mobile nodes with controllable
trajectories in the monitored field. In this framework, we present a distributed technique for iteratively
computing the trajectories of the mobile nodes in a greedy fashion. The static sensor nodes actively
assist the mobile nodes in this task by means of a bidding protocol, thus participating towards the goal
of maximizing the area coverage of the monitored field. The performance of the proposed technique is
evaluated on various simulation scenarios with different number of mobile and static nodes in terms of
achieved coverage and mean time to achieve X\% coverage. Comparison with previous state-of-the-art
techniques reveals the effectiveness and stability of the proposed method.
}, keywords = {compass, wsn}, doi = {10.1016/j.jnca.2014.10.007}, author = {Massimo Vecchio and R. L{\'o}pez-Valcarce} } @conference {659, title = {IPTV streaming source classification}, booktitle = {IEEE Workshop on Information Forensics and Security}, year = {2012}, address = {Tenerife, Spain}, author = {Miguel Masciopinto and Pedro Comesa{\~n}a} } @conference {GDCDK2011, title = {Improving the Visual Performance of S/DISCUS}, booktitle = {IEEE International Conference on Multimedia and Expo (ICME)}, year = {2011}, month = {July}, address = {Barcelona, Catalonia}, keywords = {distributed source coding, keyless security, low-complexity video coding, Slepian-Wolf coding, watermarking, wireless multimedia sensor networks}, author = {Gabriel Dom{\'\i}nguez-Conde and Deepa Kundur} } @mastersthesis {800, title = {Interference and Network Management in Cognitive Communication Systems}, volume = {Ph.D.}, year = {2011}, month = {06/2011}, school = {University of Vigo}, type = {Ph.D. thesis}, address = {Vigo, Spain}, keywords = {cognitive radio, spectrum sensing}, author = {Gonzalo V{\'a}zquez-Vilar} } @conference {ValcarceSPAWC07, title = {Iterative Envelope-Based SNR Estimation for Non-Constant Modulus Constellations}, booktitle = {IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC)}, year = {2007}, keywords = {EM, SNR, synchronization}, author = {R. L{\'o}pez-Valcarce and C. Mosquera and Wilfried Gappmair} } @article {spl06:cropping, title = {The impact of the cropping attack on scalar STDM data hiding}, journal = {IEEE Signal Processing Letters}, volume = {13}, number = {6}, year = {2006}, note = {To appear}, month = {June}, pages = {353-356}, keywords = {data-hiding, watermarking}, author = {Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez} } @article {abrardo06, title = {Improving the performance of RDM watermarking by means of trellis coded quantisation}, journal = {IEE Proceedings on Information Security}, volume = {153}, number = {3}, year = {2006}, month = {September}, pages = {107-114}, keywords = {data-hiding, watermarking}, author = {Andrea Abrardo and Mauro Barni and Fernando P{\'e}rez-Gonz{\'a}lez and C. Mosquera} } @conference {ih05_sideinformed, title = {Information-theoretic analysis of security in side-informed data hiding}, booktitle = {International Workshop on Information Hiding (IH)}, series = {Lecture Notes in Computer Science}, volume = {3727}, year = {2005}, note = {6-8 June}, pages = {131-145}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, keywords = {data-hiding, security, watermarking}, author = {Luis P{\'e}rez-Freire and Pedro Comesa{\~n}a and Fernando P{\'e}rez-Gonz{\'a}lez}, editor = {Mauro Barni and Jordi Herrera-Joancomart{\'\i} and Stefan Katzenbeisser and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {wiamis05, title = {An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios}, booktitle = {International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS)}, year = {2005}, month = {April}, address = {Montreux, Switzerland}, keywords = {data-hiding, security, watermarking}, author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {wiamis04:dm, title = {Improved Binary Dither-Modulation with perceptual constraints}, booktitle = {International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS)}, year = {2004}, month = {April}, address = {Lisboa, Portugal}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and Pedro Comesa{\~n}a} } @conference {iwdw03:invited, title = {The Importance of aliasing in structured quantization index modulation data hiding (invited lecture)}, booktitle = {International Workshop on Digital Watermarking (IWDW)}, series = {Lecture Notes in Computer Science}, volume = {2939 / 2004}, year = {2003}, month = {October}, pages = {1-17}, publisher = {Springer-Verlag Heidelberg}, organization = {Springer-Verlag Heidelberg}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {Mosquera03b, title = {Indoor Image Acquisition and Distribution System}, booktitle = {International Symposium on Power Line Communications and Its Applications (ISPLC)}, year = {2003}, keywords = {PLC}, author = {D. Fondo and M. Cacheda and C. Mosquera} } @conference {uvigo:improvingdatahiding, title = {Improving Data Hiding Performance by Using Quantization in a Projected Domain}, booktitle = {IEEE International Conference on Multimedia and Expo (ICME)}, year = {2002}, month = {August}, address = {Lausanne, Switzerland}, keywords = {data-hiding, watermarking}, author = {Fernando P{\'e}rez-Gonz{\'a}lez and F{\'e}lix Balado} } @article {uvigo:improvingperformance, title = {Improving the Performance of Spatial Watermarking of Images Using Channel Coding}, journal = {Signal Processing}, volume = {80}, number = {7}, year = {2000}, month = {July}, pages = {1261-1279}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Jos{\'e} M. Rodr{\'\i}guez and Fernando P{\'e}rez-Gonz{\'a}lez} } @conference {uvigo:interference, title = {Interference cancellation and blind equalization for linear multi-user systems}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {1}, year = {2000}, pages = {145{\textendash}148}, address = {Istanbul, Turkey}, keywords = {Digital Communications, equalization, second-order statistics}, author = {Zhi Ding and Soura Dasgupta and R. L{\'o}pez-Valcarce} } @conference {Mosquera_Perez99, title = {IIR adaptive filters for active noise control}, booktitle = {International Congress on Sound and Vibration}, year = {1999}, address = {Copenhagen, Denmark}, keywords = {ANC, IIR, SPR}, author = {C. Mosquera and J.A. G{\'o}mez and Fernando P{\'e}rez-Gonz{\'a}lez and M. Sobreira} } @conference {uvigo:theimpact, title = {The Impact of Channel Coding on the Performance of Spatial Watermarking for Copyright Protection}, booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}, volume = {5}, year = {1998}, month = {May}, pages = {2973{\textendash}2976}, address = {Seattle, Washington, USA}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Fernando P{\'e}rez-Gonz{\'a}lez and Jos{\'e} M. Rodr{\'\i}guez} } @conference {uvigo:improvingdctdomain, title = {Improving DCT-Domain Watermark Extraction Using Generalized Gaussian Models}, booktitle = {COST $\#$254 Int. Workshop on Intelligent Communications and Multimedia Terminals}, year = {1998}, month = {November}, pages = {23{\textendash}26}, address = {Ljubljana, Slovenia}, keywords = {data-hiding, watermarking}, author = {Juan R. Hern{\'a}ndez and Fernando P{\'e}rez-Gonz{\'a}lez and Mart{\'\i}n Amado} } @conference {uviwave2, title = {An Interactive Software for a Hypertext Course in Wavelets}, booktitle = {IEEE Digital Signal Processing Workshop (DSP)}, year = {1996}, month = {September}, address = {Loen, Norway}, author = {O.W. M{\'a}rquez and Nuria Gonz{\'a}lez-Prelcic} }