Export 80 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is B [Clear All Filters]
“ArboX, a Contribution to Digital Library”, in International Conference on Engineering and Computer Education (ICECE), Rio de Janeiro, Brazil, 1999.
, “A Two-Stage Codebook Building Method Using Fast WAN”, in International Conference on Image Analysis and Processing (ICIAP), Venice, Italy, 1999, pp. 1047–1050.
, “ArboX, a Contribution to Digital Library”, Computer Applications in Engineering Education, vol. 8, pp. 216–220, 2000.
, “Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications”, Signal Processing, vol. 81, pp. 1215–1238, 2001.
, “Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes”, in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
, “Turbo Coding for Sample-Level Watermarking in the DCT Domain”, in IEEE International Conference on Image Processing (ICIP), Thessaloniki, Greece, 2001, pp. 1003–1006.
, “Improving Data Hiding Performance by Using Quantization in a Projected Domain”, in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, “Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation”, in International Workshop on Information Hiding (IH), Noorwijkerhout, The Netherlands, 2002.
, “Provably or Probably Robust Data Hiding?”, in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, “Quantized Projection Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Rochester (NY), USA, 2002.
, “Digital image data hiding using side information”, University of Vigo, Spain, 2003.
, “Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03a.pdf (145.04 KB)
, “Hexagonal Quantizers are not Optimal for 2-D Data Hiding”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “Optimal Data-Hiding Strategies for Games with BER Payoffs”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116. iwdw03.ps (499.03 KB)
, “Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03b.pdf (142.96 KB)
, “Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels”, IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, “Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815. spie04em.pdf (434.03 KB)
, “Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, “Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, “Ensuring Gain Invariance in High-Rate Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Fundamentals of data hiding security and their application to spread-spectrum analysis”, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, “Information-theoretic analysis of security in side-informed data hiding”, in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145. ih05_sideinformed.pdf (218.44 KB)
, “Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, “On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
,