%0 Conference Paper %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %D 2011 %T Efficient Protocols for Secure Adaptive Filtering %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K adaptive filtering %K privacy %K security %K watermarking %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %I IEEE %C Prage, Czech Republic %P 5860-5863 %8 May %G eng %0 Conference Paper %B International Conference on Cloud Computing and Services Science (CLOSER) %D 2011 %T Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience %A Daniel A. Rodríguez-Silva %A F. Javier González-Castaño %A Lilian Adkinson-Orellana %A Alexandre Fernández-Cordeiro %A Juan Ramón Troncoso-Pastoriza %A Daniel González-Martínez %K cloud %K privacy %K security %K watermarking %B International Conference on Cloud Computing and Services Science (CLOSER) %C Noordwijkerhout, The Netherlands %8 May %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2011 %T Secure Adaptive Filtering %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K adaptive signal processing %K computational complexity %K cryptography %K digital data protection %K encrypted domain %K homomorphic encryption systems %K least mean squares algorithm %K least mean squares methods %K privacy %K secure adaptive filtering %K security %K signal privacy preservation %K SPED techniques %K watermarking %B IEEE Transactions on Information Forensics and Security %V 6 %P 469 -485 %8 June %G eng %R 10.1109/TIFS.2011.2109385 %0 Conference Paper %B International Workshop on Cloud Information System Engineering (CISE) %D 2010 %T CryptoDSPs for Cloud Privacy %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K cloud %K privacy %K security %K watermarking %B International Workshop on Cloud Information System Engineering (CISE) %S LNCS %C Hong Kong, China %V 6724 %8 December %G eng %0 Conference Paper %B Virtual Physiological Human (VPH) %D 2010 %T Secure and Private Medical Clouds using Encrypted Processing %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K cloud %K privacy %K security %K watermarking %B Virtual Physiological Human (VPH) %C Brussels, Belgium %8 October %G eng %0 Conference Paper %B Signal Processing in the Encrypted Domain (SPEED) Workshop %D 2009 %T Secure Direct and Iterative Protocols for Solving Systems of Linear Equations %A Juan Ramón Troncoso-Pastoriza %A Pedro Comesaña %A Fernando Pérez-González %K iterative protocol %K privacy %K security %K systems of linear equations %K watermarking %B Signal Processing in the Encrypted Domain (SPEED) Workshop %C Lausanne, Switzerland %P 122–141 %8 September %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2009 %T Spread spectrum watermarking security %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B IEEE Transactions on Information Forensics and Security %V 4 %P 2-24 %8 March %G eng %0 Conference Paper %B ACM Workshop on Digital Rights Management (DRM) %D 2009 %T Videosurveillance and privacy: covering the two sides of the mirror with DRM %A Juan Ramón Troncoso-Pastoriza %A Pedro Comesaña %A Luis Pérez-Freire %A Fernando Pérez-González %K access control %K privacy %K rights management %K security %K videosurveillance %K watermarking %B ACM Workshop on Digital Rights Management (DRM) %I ACM %C Chicago, IL, USA %8 November %G eng %0 Thesis %D 2008 %T Digital Watermarking Security %A Luis Pérez-Freire %K data-hiding %K security %K watermarking %I University of Vigo, Spain %G eng %9 phd %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2008 %T Security of lattice-based data hiding against the Watermarked Only Attack %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B IEEE Transactions on Information Forensics and Security %V 3 %P 593-610 %8 December %G eng %0 Conference Paper %B Third Wavila Challenge (WaCha) %D 2007 %T Disclosing secrets in watermarking and data hiding %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B Third Wavila Challenge (WaCha) %S ECRYPT proceedings series from the Otto-von-Guericke University, Magdeburg, Germany %C Saint-Malo, France %8 14 June %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 2007 %T Exploiting security holes in lattice data hiding %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %C Saint-Malo, France %8 11-13 June %G eng %0 Generic %D 2007 %T Practical estimators of the secret spreading vector for Improved Spread Spectrum modulations. Statistical analysis and results %A Luis Pérez-Freire %K data-hiding %K security %K watermarking %I Signal Theory and Communications Department, University of Vigo, Spain %8 November %G eng %9 Internal report %0 Conference Paper %B ACM Conference on Computer and Communications Security (CCS) %D 2007 %T Privacy Preserving Error Resilient DNA Searching through Oblivious Automata %A Juan Ramón Troncoso-Pastoriza %A Stefan Katzenbeisser %A Mehmet Celik %K DNA %K privacy %K security %K watermarking %B ACM Conference on Computer and Communications Security (CCS) %I ACM Press %C Alexandria, Virginia, USA %P 519–528 %8 Oct 29–Nov 2 %G eng %0 Conference Paper %B ACM Workshop on Multimedia and Security (MMSEC) %D 2007 %T A Secure Multidimensional Point Inclusion Protocol %A Juan Ramón Troncoso-Pastoriza %A Stefan Katzenbeisser %A Mehmet Celik %A Aweke Lemma %K multiparty computation %K privacy %K security %K watermarking %B ACM Workshop on Multimedia and Security (MMSEC) %C Dallas, Texas, USA %P 109–120 %8 September %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2007 %T Security of Spread-Spectrum-Based Data Hiding %A Luis Pérez-Freire %A Pierre Moulin %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K data-hiding %K security %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %8 January %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2006 %T An accurate analysis of scalar quantization-based data-hiding %A Luis Pérez-Freire %A Fernando Pérez-González %A Sviatoslav Voloshynovskiy %K data-hiding %K security %K watermarking %B IEEE Transactions on Information Forensics and Security %V 1 %P 80-86 %8 March %G eng %0 Conference Paper %B ACM Workshop on Multimedia and Security (MMSEC) %D 2006 %T On achievable security levels for lattice data hiding in the Known Message Attack scenario %A Luis Pérez-Freire %A Fernando Pérez-González %A Teddy Furon %K data-hiding %K security %K watermarking %B ACM Workshop on Multimedia and Security (MMSEC) %I ACM %C Geneva, Switzerland %P 68-79 %8 September %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2006 %T Secret dither estimation in lattice-quantization data hiding: a set-membership approach %A Luis Pérez-Freire %A Fernando Pérez-González %A Pedro Comesaña %E Edward J. Delp %E Ping W. Wong %K data-hiding %K security %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2006 %T Security of lattice-based data hiding against the Known Message Attack %A Luis Pérez-Freire %A Fernando Pérez-González %A Teddy Furon %A Pedro Comesaña %K data-hiding %K security %K watermarking %B IEEE Transactions on Information Forensics and Security %V 1 %P 421-439 %8 December %G eng %0 Journal Article %J Transactions on Data Hiding and Multimedia Security I %D 2006 %T Watermarking security: a survey %A Luis Pérez-Freire %A Pedro Comesaña %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B Transactions on Data Hiding and Multimedia Security I %V 4300 %P 41-72 %8 October %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2005 %T Detection in quantization-based watermarking: performance and security issues %A Luis Pérez-Freire %A Pedro Comesaña %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K data-hiding %K security %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 2005 %T Information-theoretic analysis of security in side-informed data hiding %A Luis Pérez-Freire %A Pedro Comesaña %A Fernando Pérez-González %E Mauro Barni %E Jordi Herrera-Joancomartí %E Stefan Katzenbeisser %E Fernando Pérez-González %K data-hiding %K security %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %V 3727 %P 131-145 %G eng %0 Conference Paper %B International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) %D 2005 %T An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios %A Pedro Comesaña %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) %C Montreux, Switzerland %8 April %G eng