“On achievable security levels for lattice data hiding in the Known Message Attack scenario”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, “Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_dpc.pdf (165.56 KB)
, “Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815. spie04em.pdf (434.03 KB)
, “The blind Newton senstivity attack”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sensitivity.ps (1.62 MB)
, “Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, “On the capacity of stegosystems”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264. acm07stego.pdf (198.41 KB)
, “Coding and Synchronization: A Boost and a Bottleneck for the Development of Image Watermarking”, in COST #254 Int. Workshop on Intelligent Communications, L'Aquila, Italy, 1998, pp. 77–82.
, “Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes”, in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
, “Data Hiding for Copyright Protection of Still Images”, in Emerging Techniques for Communication Terminals, Tolouse, France, 1997, pp. 285–289.
, “Detection in quantization-based watermarking: performance and security issues”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, “Disclosing secrets in watermarking and data hiding”, in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
, “On Distortion Measures Associated to Random Desynchronization Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Dither modulation in the logarithmic domain”, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264. iwdw07.pdf (183.38 KB)
, “Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03a.pdf (145.04 KB)
, “Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Ensuring Gain Invariance in High-Rate Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Exploiting security holes in lattice data hiding”, in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.
, “Fundamentals of data hiding security and their application to spread-spectrum analysis”, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, “Hexagonal Quantizers are not Optimal for 2-D Data Hiding”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “High-rate quantization data hiding robust to arbitrary linear filtering attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, “The Impact of Channel Coding on the Performance of Spatial Watermarking for Copyright Protection”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seattle, Washington, USA, 1998, vol. 5, pp. 2973–2976.
, “The Importance of aliasing in structured quantization index modulation data hiding (invited lecture)”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 1-17.
, “Improved Binary Dither-Modulation with perceptual constraints”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, Portugal, 2004. wiamis04_dm.ps (268.36 KB)
, “Improving Data Hiding Performance by Using Quantization in a Projected Domain”, in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, “Improving DCT-Domain Watermark Extraction Using Generalized Gaussian Models”, in COST #254 Int. Workshop on Intelligent Communications and Multimedia Terminals, Ljubljana, Slovenia, 1998, pp. 23–26.
,