Export 28 results:
[ Author] Title Type Year Filters: Author is Fernando Pérez-González [Clear All Filters]
“Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior”, 2014. techrep.pdf (267.69 KB)
, “A Tutorial on Digital Watermarking”, in IEEE Annual Carnahan Conference on Security Technology, Madrid, Spain, 1999.
, “High-rate quantization data hiding robust to arbitrary linear filtering attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, “Misconvergence and stabilization of adaptive IIR lattice filters”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Istanbul, Turkey, 2000, vol. 1, pp. 65–68.
, “PRNU-leaks: facts and remedies”, in 2020 28th European Signal Processing Conference (EUSIPCO), 2021, pp. 720-724.
, “Improving Data Hiding Performance by Using Quantization in a Projected Domain”, in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, “Benford's Law in Image Processing”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007.
, “A Least Squares approach to user profiling in pool mix-based anonymous communication systems.”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 115–120. wifs2012_pg.pdf (321.08 KB)
, “Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, “Road vehicle speed estimation from a two-microphone array”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Orlando, FL, USA, 2002, vol. 2, pp. 1321–1324.
, “PRNU-leaks: facts and remedies”, in 2020 28th European Signal Processing Conference (EUSIPCO), Virtual Event Amsterdam, 2020.
, “Quantized Projection Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Rochester (NY), USA, 2002.
, “A Generalization of Benford's Law and Its Application to Images”, in European Control Conference (ECC), Kos, Greece, 2007.
, “Understanding statistical disclosure: A least squares approach”, in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57. pets2012_fpg.pdf (450.58 KB)
, “Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels”, IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, “Characterization and Algebraic Solution to the Extreme-Point Robust SPR Problem”, in IFAC World Congress, San Francisco, CA, USA, 1996, pp. 391-396.
, “Fast Sequential Forensic Detection of Camera Fingerprint”, in IEEE International Conference on Image Processing (ICIP), 2016. perez.pdf (325.29 KB)
, “Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation”, in International Workshop on Information Hiding (IH), Noorwijkerhout, The Netherlands, 2002.
, “Ensuring Gain Invariance in High-Rate Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Least Squares Disclosure Attacks: User Profiling for Mix-based Anonymous Communication Systems”, University of Vigo, Vigo, 2013. lssda-main-tifs.pdf (516.78 KB)
, “The Importance of aliasing in structured quantization index modulation data hiding (invited lecture)”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 1-17.
, “Algebraic LTI Filter Synthesis for Simultaneously Making a Convex Combination of Discrete-Time Plants SPR”, in IEEE Conference on Decision and Control (CDC), New Orleans, LA, 1995, pp. 780-781.
, “A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems”, IEEE Transactions on Information Forensics and Security, 2014. lsdaTIFS14.pdf (1.64 MB)
, “Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications”, Signal Processing, vol. 81, pp. 1215–1238, 2001.
, “Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
,