%0 Conference Paper %B 2023 IEEE Wireless Communications and Networking Conference (WCNC) %D 2023 %T Clock and Orientation-Robust Simultaneous Radio Localization and Mapping at Millimeter Wave Bands %A Gomez-Cuba, Felipe %A Feijoo-Rodríguez, Gonzalo %A González-Prelcic, Nuria %B 2023 IEEE Wireless Communications and Networking Conference (WCNC) %P 1-7 %G eng %R 10.1109/WCNC55385.2023.10119129 %0 Journal Article %J IEEE Signal Processing Magazine %D 2023 %T Information Forensics and Security: A quarter-century-long journey %A Barni, Mauro %A Campisi, Patrizio %A Delp, Edward J. %A Doërr, Gwenaël %A Fridrich, Jessica %A Memon, Nasir %A Fernando Pérez-González %A Rocha, Anderson %A Verdoliva, Luisa %A Wu, Min %K forensics %K History %K Information processing %K Information security %K Intellectual property %K Machine Learning %K privacy %K Signal processing %K Surveillance %B IEEE Signal Processing Magazine %V 40 %P 67-79 %G eng %U https://ieeexplore.ieee.org/document/10188887 %R 10.1109/MSP.2023.3275319 %0 Journal Article %J Signal Processing: Image Communication %D 2023 %T Source camera attribution via PRNU emphasis: Towards a generalized multiplicative model %A Fernández-Menduiña, Samuel %A Fernando Pérez-González %A Miguel Masciopinto %B Signal Processing: Image Communication %V 114 %G eng %U https://www.sciencedirect.com/science/article/pii/S0923596523000267 %R https://doi.org/10.1016/j.image.2023.116944 %0 Conference Paper %B VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) %D 2021 %T Homomorphic SVM Inference for Fraud Detection %A Adrián Vázquez-Saavedra %A Gonzalo Jiménez-Balsa %A Jaime Loureiro-Acuña %A Manuel Fernández-Veiga %A Alberto Pedrouzo-Ulloa %B VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) %I Ediciones de la Universidad de Castilla-La Mancha %G eng %1

JNIC 2021 Best Short Paper Award

%0 Journal Article %J Eurasip Journal on Information Security %D 2021 %T On the information leakage quantification of camera fingerprint estimates %A Fernández-Menduiña, Samuel %A Fernando Pérez-González %B Eurasip Journal on Information Security %V 2021 %P 18 %G eng %U https://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-021-00121-6 %N 6 %R https://doi.org/10.1186/s13635-021-00121-6 %0 Conference Paper %B 2020 28th European Signal Processing Conference (EUSIPCO) %D 2021 %T PRNU-leaks: facts and remedies %A Fernando Pérez-González %A Fernández-Menduiña, Samuel %K Degradation %K estimation %K Europe %K Fingerprint %K Fingerprint recognition %K forensics %K information theory %K Leakage %K Membership inference %K privacy %K PRNU %K Signal processing %B 2020 28th European Signal Processing Conference (EUSIPCO) %P 720-724 %G eng %U https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9287451 %R 10.23919/Eusipco47968.2020.9287451 %0 Conference Paper %B 2020 28th European Signal Processing Conference (EUSIPCO) %D 2020 %T PRNU-leaks: facts and remedies %A Fernando Pérez-González %A Fernández-Menduiña, Samuel %B 2020 28th European Signal Processing Conference (EUSIPCO) %C Virtual Event Amsterdam %8 2021 %G eng %U https://ieeexplore.ieee.org/document/9287451 %R 10.23919/Eusipco47968.2020.9287451 %0 Journal Article %J IEEE Signal Processing Letters %D 2020 %T Temporal Localization of Non-Static Digital Videos Using the Electrical Network Frequency %A Fernández-Menduiña, Samuel %A Fernando Pérez-González %B IEEE Signal Processing Letters %V 27 %P 5 %8 04/2020 %G eng %U https://ieeexplore.ieee.org/document/9072308 %& 745 %R 10.1109/LSP.2020.2988145 %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2020 %T Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint %A David Vázquez-Padín %A Marco Fontani %A Dasara Shullani %A Fernando Pérez-González %A Alessandro Piva %A Mauro Barni %K B-frames %K double compression detection %K GOP size estimation %K rate distortion optimization %K video forensics %X

The Variation of Prediction Footprint (VPF), formerly used in video forensics for double compression detection and GOP size estimation, is comprehensively investigated to improve its acquisition capabilities and extend its use to video sequences that contain bi-directional frames (B-frames). By relying on a universal rate-distortion analysis applied to a generic double compression scheme, we first explain the rationale behind the presence of the VPF in double compressed videos and then justify the need of exploiting a new source of information such as the motion vectors, to enhance the VPF acquisition process. Finally, we describe the shifted VPF induced by the presence of B-frames and detail how to compensate the shift to avoid misguided GOP size estimations. The experimental results show that the proposed Generalized VPF (G-VPF) technique outperforms the state of the art, not only in terms of double compression detection and GOP size estimation, but also in reducing computational time.

%B IEEE Transactions on Information Forensics and Security %V 15 %P 1815-1830 %8 12/2019 %G eng %N 1 %& 1815 %0 Conference Proceedings %B 2nd XoveTIC Conference %D 2019 %T Solving self-interference issues in a Full-Duplex radio transceiver %A Miguel Franco-Martinez %A Francisco-Javier Martinez-Alonso %A R. López-Valcarce %K adaptive signal processing %K full-duplex %K winter %X
Most wireless devices transmit and receive at different spectrum frequency bands. This
approach is no longer optimal due to increasing electromagnetic exhaustion. Besides, interference
among all present and future working services should be negligible. A full-duplex scheme using
the same band for simultaneous uplink and downlink is a huge step towards solving this issue.
However, sharing the same frequency band involves a large interference of transmitted signal over
received signal. To fix this problem, we propose the usage of a hybrid multistage cancellation system,
consisting of an analog cancellation setup at RF frequencies and a baseband digital cancellation stage.
%B 2nd XoveTIC Conference %C A Coruña (Spain) %8 09/2019 %G eng %R 10.3390/proceedings2019021035 %0 Conference Paper %B IEEE International Workshop on Multimedia Signal Processing (MMSP) %D 2013 %T Localization of Forgeries in MPEG-2 Video through GOP Size and DQ analysis %A Daniele Labartino %A Tiziano Bianchi %A Alessia De Rosa %A Marco Fontani %A David Vázquez-Padín %A Alessandro Piva %A Mauro Barni %X

This work addresses forgery localization in MPEG-2 compressed videos. The proposed method is based on the analysis of Double Quantization (DQ) traces in frames that were encoded twice as intra (i.e., I-frames).  Employing a state-of-the-art method, such frames are located in the video under analysis by estimating the size of the Group Of Pictures (GOP) that was used in the first compression; then, the DQ analysis is devised for the MPEG-2 encoding scheme and applied to frames that were intra-coded in both the first and second compression. In such a way, regions that were manipulated between the two encodings are detected. Compared to existing methods based on double quantization analysis, the proposed scheme makes forgery localization possible on a wider range of settings.

 
%B IEEE International Workshop on Multimedia Signal Processing (MMSP) %C Pula (Sardinia), Italy %P 494-499 %G eng %1

Top 10% Award

%0 Conference Paper %B IEEE International Workshop on Information Forensics and Security (WIFS) %D 2012 %T Detection of video double encoding with GOP size estimation %A David Vázquez-Padín %A Marco Fontani %A Tiziano Bianchi %A Pedro Comesaña %A Alessandro Piva %A Mauro Barni %X

Video forensics is an emerging discipline, that aims at inferring information about the processing history undergone by a digital video in a blind fashion. In this work we introduce a new forensic footprint and, based on it, propose a method for detecting whether a video has been encoded twice; if this is the case, we also estimate the size of the Group Of Pictures (GOP) employed during the first encoding. As shown in the experiments, the footprint proves to be very robust even in realistic settings (i.e., when encoding is carried out using typical compression rates), that are rarely addressed by existing techniques.

%B IEEE International Workshop on Information Forensics and Security (WIFS) %I IEEE %C Tenerife, Spain %P 151-156 %8 12/2012 %G eng %0 Conference Paper %B International Conference on Cloud Computing and Services Science (CLOSER) %D 2011 %T Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience %A Daniel A. Rodríguez-Silva %A F. Javier González-Castaño %A Lilian Adkinson-Orellana %A Alexandre Fernández-Cordeiro %A Juan Ramón Troncoso-Pastoriza %A Daniel González-Martínez %K cloud %K privacy %K security %K watermarking %B International Conference on Cloud Computing and Services Science (CLOSER) %C Noordwijkerhout, The Netherlands %8 May %G eng %0 Conference Paper %B IEEE International Workshop on Information Forensics and Security (WIFS) %D 2009 %T Blind decoder for binary probabilistic traitor tracing codes %A Luis Pérez-Freire %A Teddy Furon %K collusion %K information theory %K Tardos %K Traitor tracing %K watermarking %B IEEE International Workshop on Information Forensics and Security (WIFS) %C London, UK %P 56-60 %8 6-9 December %G eng %0 Conference Paper %B ACM Workshop on Multimedia and Security (MMSEC) %D 2009 %T EM decoding of Tardos traitor tracing codes %A Teddy Furon %A Luis Pérez-Freire %K collusion channel %K Expectation-Maximization %K iterative decoding %K Tardos code %K Traitor tracing %K watermarking %B ACM Workshop on Multimedia and Security (MMSEC) %C Princeton, NJ, USA %8 7-8 September %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 2009 %T Estimating the minimal length of Tardos code %A Teddy Furon %A Luis Pérez-Freire %A Arnaud Guyader %A Frédéric Cérou %K Fingerprinting %K Rare event %K Tardos code %K Traitor tracing %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %C Darmstadt, Germany %8 7-10 June %G eng %0 Conference Paper %B IEEE International Workshop on Information Forensics and Security (WIFS) %D 2009 %T Worst case attacks against binary probabilistic traitor tracing codes %A Teddy Furon %A Luis Pérez-Freire %K collusion %K information theory %K Tardos %K Traitor tracing %K watermarking %B IEEE International Workshop on Information Forensics and Security (WIFS) %C London, UK %P 46-50 %8 6-9 December %G eng %0 Book Section %D 2007 %T Digital Satellite Communications %A Sandro Scalise %A L. Castanet %A M. Luglio %A Neri, Massimo %A Marcos Álvarez-Díaz %A J. Bito %A M. Bousquet %A I. Frigyes %A P. Horvath %A Axel Jahn %A M. Krejcarek %A J. Lemorton %A S. Morosi %A M. A. Vázquez-Castro %I Springer %C New York %P - %8 April %G eng %& Satellite Channel Impairments %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2007 %T Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme %A G. Boato %A C. Fontanari %A F. G. B. De Natale %A Fernando Pérez-González %K watermarking %B IEEE International Conference on Image Processing (ICIP) %C San Antonio, TX, USA %P 1261-1264 %8 September %G eng %0 Conference Paper %B ACM Workshop on Multimedia and Security (MMSEC) %D 2006 %T On achievable security levels for lattice data hiding in the Known Message Attack scenario %A Luis Pérez-Freire %A Fernando Pérez-González %A Teddy Furon %K data-hiding %K security %K watermarking %B ACM Workshop on Multimedia and Security (MMSEC) %I ACM %C Geneva, Switzerland %P 68-79 %8 September %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2006 %T Security of lattice-based data hiding against the Known Message Attack %A Luis Pérez-Freire %A Fernando Pérez-González %A Teddy Furon %A Pedro Comesaña %K data-hiding %K security %K watermarking %B IEEE Transactions on Information Forensics and Security %V 1 %P 421-439 %8 December %G eng %0 Conference Paper %B AIAA International Communications Satellite Systems Conference (ICSSC) %D 2005 %T Aeronautical Channel Model for Broadband L-Band Satellite Communication %A Madhavendra Richharia %A Naveen Kaluvala %A Panos Fines %A Marcos Álvarez-Díaz %A Axel Jahn %K Digital Communications %K L-Band %K satellite communications %B AIAA International Communications Satellite Systems Conference (ICSSC) %C Rome, Italy %8 September 25-28 %G eng %0 Conference Paper %B International Symposium on Power Line Communications and Its Applications (ISPLC) %D 2003 %T Indoor Image Acquisition and Distribution System %A D. Fondo %A M. Cacheda %A C. Mosquera %K PLC %B International Symposium on Power Line Communications and Its Applications (ISPLC) %G eng %0 Conference Paper %B International Symposium on Power Line Communications and Its Applications (ISPLC) %D 2003 %T A low complexity all-digital DS-SS transceiver for power-line communications %A M. Ferreiro %A M. Cacheda %A C. Mosquera %K DS-SS %K modem %K PLC %B International Symposium on Power Line Communications and Its Applications (ISPLC) %G eng %0 Journal Article %J IEEE Transactions on Signal Processing %D 2000 %T Exponential asymptotic stability of time-varying inverse prediction error filters %A R. López-Valcarce %A Soura Dasgupta %A Roberto Tempo %A Minyue Fu %K nonstationary processes %K prediction error filters %K stability %B IEEE Transactions on Signal Processing %V 48 %P 1928–1936 %8 July %G eng %0 Conference Paper %B IEEE Conference on Decision and Control (CDC) %D 1998 %T Stability conditions for the time-varying linear predictor %A R. López-Valcarce %A Soura Dasgupta %A Minyue Fu %A Roberto Tempo %K nonstationary processes %K prediction error filters %K stability %B IEEE Conference on Decision and Control (CDC) %C Tampa, FL, USA %P 1840–1845 %8 December %G eng %0 Book Section %B Intelligent methods in signal processing and communications %D 1997 %T Analysis and Synthesis Tools for Robust SPRness %A C. Mosquera %A Juan R. Hernández %A Fernando Pérez-González %E A. Figueiras %E D. Docampo %E Fernando Pérez-González %K robust %K SPR %B Intelligent methods in signal processing and communications %I Birkhauser %P 147-171 %G eng %0 Journal Article %J Signal Processing: Image Communication %D 1996 %T A comparison of system architectures for intelligent document understanding %A G. S. D. Farrow %A C. S. Xydeas %A J.P. Oakley %A A. Khorabi %A Nuria González-Prelcic %B Signal Processing: Image Communication %V 9 %P 1-19 %8 November %G eng