Export 110 results:
Author Title [ Type(Desc)] Year
Filters: Keyword is watermarking  [Clear All Filters]
Conference Paper
L. Pérez-Freire, Pérez-González, F., and Furon, T., On achievable security levels for lattice data hiding in the Known Message Attack scenario, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
P. Comesaña, Pérez-González, F., and Willems, F. M. J., Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_dpc.pdf (165.56 KB)
M. Barni, Comesaña, P., Pérez-González, F., and Tondi, B., Are you threatening me? Towards smart detectors in watermarking, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.PDF icon spie14_2.0.pdf (430.73 KB)
L. Pérez-Freire and Furon, T., Blind decoder for binary probabilistic traitor tracing codes, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
F. Balado, Pérez-González, F., and Comesaña, P., Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.PDF icon spie04em.pdf (434.03 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The blind Newton senstivity attack, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.File spie06_sensitivity.ps (1.62 MB)
F. Balado and Pérez-González, F., Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
P. Comesaña and Pérez-González, F., On the capacity of stegosystems, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.PDF icon acm07stego.pdf (198.41 KB)
J. R. Hernández, Pérez-González, F., and Rodríguez, J. M., Coding and Synchronization: A Boost and a Bottleneck for the Development of Image Watermarking, in COST #254 Int. Workshop on Intelligent Communications, L'Aquila, Italy, 1998, pp. 77–82.
F. Balado and Pérez-González, F., Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes, in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
J. R. Troncoso-Pastoriza and Pérez-González, F., CryptoDSPs for Cloud Privacy, in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
J. R. Hernández, Pérez-González, F., and Rodríguez, J. M., Data Hiding for Copyright Protection of Still Images, in Emerging Techniques for Communication Terminals, Tolouse, France, 1997, pp. 285–289.
L. Pérez-Freire, Comesaña, P., and Pérez-González, F., Detection in quantization-based watermarking: performance and security issues, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_secur.pdf (401.96 KB)
M. Scagliola, Pérez-González, F., and Guccione, P., A Dirty Paper Scheme for Hierarchical OFDM, in IEEE International Conference on Communications (ICC), Kioto, Japan, 2011.
L. Pérez-Freire and Pérez-González, F., Disclosing secrets in watermarking and data hiding, in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
F. Balado and Pérez-González, F., On Distortion Measures Associated to Random Desynchronization Attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
P. Comesaña and Pérez-González, F., Dither modulation in the logarithmic domain, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.PDF icon iwdw07.pdf (183.38 KB)
F. Pérez-González, Comesaña, P., and Balado, F., Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks., in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.PDF icon icip03a.pdf (145.04 KB)
J. R. Troncoso-Pastoriza and Pérez-González, F., Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
J. R. Troncoso-Pastoriza and Pérez-González, F., Efficient Protocols for Secure Adaptive Filtering, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863.PDF icon secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
T. Furon and Pérez-Freire, L., EM decoding of Tardos traitor tracing codes, in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
D. A. Rodríguez-Silva, González-Castaño, J. F., Adkinson-Orellana, L., Fernández-Cordeiro, A., Troncoso-Pastoriza, J. R., and González-Martínez, D., Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience, in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
F. Pérez-González, Mosquera, C., Barni, M., and Abrardo, A., Ensuring Gain Invariance in High-Rate Data-Hiding, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
T. Furon, Pérez-Freire, L., Guyader, A., and Cérou, F., Estimating the minimal length of Tardos code, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
L. Pérez-Freire and Pérez-González, F., Exploiting security holes in lattice data hiding, in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.