“Zero-Knowledge watermark detector robust to sensitivity attacks”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
, “Worst case attacks against binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
, “Worst case additive attack against quantization-based watermarking techniques”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
, “Worst case additive attack against quantization-based data-hiding methods”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Witsenhausen's counterexample and its links with multimedia security problems”, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011. iwdw11_witsenhausen.pdf (152.97 KB)
, “Wideband Spectrum Sensing in Cognitive Radio: Joint Estimation of Noise Variance and Multiple Signal Levels”, in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Perugia, Italy, 2009.
, “Wideband Spectrum Sensing From Compressed Measurements Using Spectral Prior Information”, IEEE Trans. Signal Process., vol. 61, pp. 6232-6246, 2013.
, “Wideband Spectral Estimation from Compressed Measurements Exploiting Spectral a priori Information in Cognitive Radio Systems”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, U.S.A., 2010.
, “Wideband self-interference cancellation for better spectrum use”, in IEEE WoWMoM 2016 Workshop on Fifth Generation Wireless, 2016. SIcancellationFinal.pdf (435.86 KB)
, “Wideband full-duplex MIMO relays with blind adaptive self-interference cancellation”, Signal Processing, vol. 130, pp. 74-85, 2017. SIGPRO_6170.pdf (1.41 MB)
, “Weber's law-based side-informed data hiding”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843. comesanaicassp11.pdf (119.42 KB)
, “Wavelet-packet-based subband adaptive equalization”, Signal Processing, vol. 81, pp. 1641-1662, 2001.
, “Wavelet Packet based subband adaptive equalization”, in Baiona Workshop on Emerging Technologies in Telecommunications, Baiona, Spain, 1999.
, “Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB)
, “On a watermarking scheme in the logarithmic domain and its perceptual advantages”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264. icip07logwat.pdf (77.03 KB)
, “Visible Encryption: Using Paper as a Secure Channel”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “Videosurveillance and privacy: covering the two sides of the mirror with DRM”, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009. drm18-troncoso.pdf (417.17 KB)
, “Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint”, IEEE Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 1815-1830, 2020. TIFS19_GVPF.pdf (1.01 MB)
, “Uvi_Wave, the Ultimate Toolbox for Wavelet Transforms and Filter Banks”, in Baiona Workshop on Intelligent Methods in Signal Processing and Communication, Baiona, Spain, 1996.
, “The use of unit norm tight measurement matrices for one-bit compressed sensing”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2016.
, “A Unified Framework for Dynamic Spectrum Leasing (DSL) in Cognitive Radios”, in IEEE Broadband Wireless Access Workshop, 2009.
, “Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks”, in IEEE Workshop on Information Forensics and Security, 2014. wifs14.pdf (347.72 KB)
, “Understanding statistical disclosure: A least squares approach”, in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57. pets2012_fpg.pdf (450.58 KB)
, “A Two-Stage Codebook Building Method Using Fast WAN”, in International Conference on Image Analysis and Processing (ICIAP), Venice, Italy, 1999, pp. 1047–1050.
, “A two-objective evolutionary approach based on topological constraints for node localization in wireless sensor networks”, Applied Soft Computing, vol. 12, no. 7, pp. 1891-1901, 2011. asoc-d-10-00754r1.pdf (597.83 KB)
,