“Polynomial extension method for size-limited paraunitary filter banks”, in European Signal Processing Conference (EUSIPCO), Toulouse, France, 2002.
, “Design of non-expansionist and orthogonal extension methods for tree-structured filter banks”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Estambul, Turkey, 2000.
, “Smooth Orthogonal Signal Extensions for Paraunitary Tree-structured Filter Banks”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Orlando, USA, 2002.
, “Analysis and Design of Multirate Synchronous Sampling Schemes for Sparse Multiband Signals”, in European Signal Processing Conference (EUSIPCO 2012), 2012, pp. 1184-1188. elenanuriaeusipco2012.pdf (408.64 KB)
, “Flat Fading Channel Estimation Based on Dirty Paper Coding”, University of Vigo, Vigo, 2016. thesis_gdomin.pdf (2.52 MB)
, “Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009. tifs09performanceanalysis.pdf (232.67 KB)
, “Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009. icip09domcomper.pdf (129.76 KB)
, “Improving the Visual Performance of S/DISCUS”, in IEEE International Conference on Multimedia and Expo (ICME), Barcelona, Catalonia, 2011.
, “A New Look At ML Step-Size Estimation for Scalar Costa Scheme Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014. icip14.pdf (158.08 KB)
, “Flat Fading Channel Estimation Based on Dirty Paper Coding”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. icassp14_gdc_pca_fpg.pdf (154.64 KB)
, “Interference cancellation and blind equalization for linear multi-user systems”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Istanbul, Turkey, 2000, vol. 1, pp. 145–148.
, “Joint Linear Precoding and Beamforming for the Forward Link of Multi-Beam Broadband Satellite Systems”, in IEEE GLOBECOM, Houston, Texas, USA, 2011. devi1112_joint.pdf (143.58 KB)
, “Visible Encryption: Using Paper as a Secure Channel”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “On the Role of Differentiation for Resampling Detection”, in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010.
, “Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks”, vol. 22, no. 12, p. 36, 2020.
, “Joint detection of full-frame linear filtering and JPEG compression in digital images”, in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013. wifs13_jpeg.pdf (1.02 MB)
, “Forensic analysis of full-frame linearly filtered JPEG images”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521. conotter.pdf (780.94 KB)
, “Forensic detection of processing operator chains: recovering the history of filtered JPEG images”, IEEE Transactions on Information Forensics and Security, 2015. tifs.pdf (2.46 MB)
, “Side-informed data hiding: robustness and security analysis”, University of Vigo, Spain, 2006. thesis_pedro.pdf (2.18 MB)
, “Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819. spie08one-bit-wm.pdf (277.85 KB)
, “Quantization lattice estimation for multimedia forensics”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456. icip13.pdf (88.9 KB)
, “The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, “Witsenhausen's counterexample and its links with multimedia security problems”, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011. iwdw11_witsenhausen.pdf (152.97 KB)
, “Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601. spie04.ps (572.73 KB)
, “Blind Newton Sensitivity Attack”, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
,