“PRNU-leaks: facts and remedies”, in 2020 28th European Signal Processing Conference (EUSIPCO), Virtual Event Amsterdam, 2020.
, “Processing Finite Length Signals via Filter Banks without Border Distortions: A Non-Expansionist Solution”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Phoenix, USA, 1999.
, “Properties of real and complex ETFs and their application to the design of low coherence frames”, Linear Algebra and its Applications, vol. 508, pp. 81-90, 2016.
, “Provably or Probably Robust Data Hiding?”, in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, “Pushing for higher rates and efficiency in Satcom: the different perspectives within SatNExIV”, in Twelfth International Symposium on Wireless Communication Systems (ISWCS), Brussels, 2015. p206-vazquez.pdf (253.14 KB)
, “Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264. icassp07reproducible.pdf (67.03 KB)
, “Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals”, in European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018. Eusipco18_Masciopinto_PerezGonzalez.pdf (600.61 KB)
, “Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601. spie04.ps (572.73 KB)
, “Quantization lattice estimation for multimedia forensics”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456. icip13.pdf (88.9 KB)
, “Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, “Quantization-Based Methods: Additive Attacks Performance Analysis”, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, “Quantization-based watermarking performance improvement using host statistics: additive noise attack”, in ACM Workshop on Multimedia and Security (MMSEC), Magdeburg, Germany, 2004.
, “Quantized Projection Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Rochester (NY), USA, 2002.
, “Radar aided mmWave beam alignment in V2I communications supporting antenna diversity”, in Information Theory and Applications Workshop (ITA, 2016.
, “Radio Maps for Beam Alignment in mmWave Communications with Location Uncertainty”, in IEEE 99th Vehicular Technology Conference: VTC2024-Spring. Workshop "Radio Map for 6G Communications", Singapore, 2024.
, “A Random Matrix Approach to the Forensic Analysis of Upscaled Images”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115-2130, 2017. TIFS17_resampling.pdf (1.04 MB)
, “Random Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling”, in International Tyrrhenian Workshop on Digital Communication 2017, Palermo, Italy, 2017, pp. 109-124. TIWDC17_dvazquez_fperez_pcomesan.pdf (394.61 KB)
, “Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, “Realizable linear and decision feedback equalizers: properties and connections”, IEEE Transactions on Signal Processing, vol. 52, pp. 757–773, 2004.
, “Realizable minimum mean-squared error channel shorteners”, IEEE Transactions on Signal Processing, vol. 53, pp. 4354–4362, 2005. T_SP_02192_2004.pdf (149.65 KB)
, “Relaxation of the SPR condition with applications to the convergence of adaptive recursive algorithms”, University of Vigo, Spain, 1998.
, “Resource Management in the multibeam NOMA-based satellite downlink”, in 45th International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2020. Resource_Management_in_the_multibeam_NOMA_based_satellite_downlink.pdf (200.8 KB)
, “Rethinking Location Privacy for Unknown Mobility Behaviors”, in IEEE European Symposium on Security and Privacy (EuroS&P), 2019. ms.pdf (634.43 KB)
, “The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
,