“Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels”, IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, “Visible Encryption: Using Paper as a Secure Channel”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815. spie04em.pdf (434.03 KB)
, “Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, “Improved Binary Dither-Modulation with perceptual constraints”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, Portugal, 2004. wiamis04_dm.ps (268.36 KB)
, “Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601. spie04.ps (572.73 KB)
, “Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, “Revealing the true achievable rates of Scalar Costa Scheme”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 203-206.
, “Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_dpc.pdf (165.56 KB)
, “Detection in quantization-based watermarking: performance and security issues”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, “Ensuring Gain Invariance in High-Rate Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Fundamentals of data hiding security and their application to spread-spectrum analysis”, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, “Information-theoretic analysis of security in side-informed data hiding”, in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145. ih05_sideinformed.pdf (218.44 KB)
, “An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005. wiamis05.pdf (119.47 KB)
, “Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, “On reversibility of random binning techniques: multimedia perspectives”, in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005. cms05.pdf (267.92 KB)
, “Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Spread-spectrum vs. quantization-based data hiding: misconceptions and implications”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Worst case additive attack against quantization-based data-hiding methods”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “An accurate analysis of scalar quantization-based data-hiding”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, “On achievable security levels for lattice data hiding in the Known Message Attack scenario”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, “Blind Newton Sensitivity Attack”, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
, “The blind Newton senstivity attack”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sensitivity.ps (1.62 MB)
, “On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
,