“Side-informed data hiding: robustness and security analysis”, University of Vigo, Spain, 2006. thesis_pedro.pdf (2.18 MB)
, “Digital Watermarking Security”, University of Vigo, Spain, 2008. ThesisPerezFreire.pdf (4.79 MB)
, “Digital image data hiding using side information”, University of Vigo, Spain, 2003.
, “Practical estimators of the secret spreading vector for Improved Spread Spectrum modulations. Statistical analysis and results”. Signal Theory and Communications Department, University of Vigo, Spain, 2007.
, “Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB)
, “Statistical Analysis of Watermarking Schemes for Copyright Protection of Images”, Proc. of the IEEE, vol. 87, pp. 1142–1166, 1999.
, “Spread spectrum watermarking security”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
, “Security of lattice-based data hiding against the Watermarked Only Attack”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, “Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, “Secure Adaptive Filtering”, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, “Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, Signal Processing, vol. 86, pp. 1076-1088, 2006.
, “Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “Quantization-Based Methods: Additive Attacks Performance Analysis”, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, “Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, “Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009. tifs09performanceanalysis.pdf (232.67 KB)
, “Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels”, IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, “Performance Analysis of a 2D-Multipulse Amplitude Modulation Scheme for Data Hiding and Watermarking of Still Images”, IEEE Journal on Selected Areas in Communications, vol. 16, pp. 510–524, 1998.
, “Leaving Timing Channel Fingerprints in Hidden Service Log Files”, Digital Investigation, 2010.
, “Improving the Performance of Spatial Watermarking of Images Using Channel Coding”, Signal Processing, vol. 80, pp. 1261-1279, 2000.
, “Improving the performance of RDM watermarking by means of trellis coded quantisation”, IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006.
, “The impact of the cropping attack on scalar STDM data hiding”, IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006. ieee-spl06_cropping.ps (243.75 KB)
, “High-rate data-hiding robust to linear filtering for colored hosts”, EURASIP Journal on Information Security, 2009.
, “Gain-Invariant Dirty Paper Coding for Hierarchical OFDM”, IEEE Transactions on Communications, vol. 59, pp. 3323-3334, 2011.
, “Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks”, EURASIP Journal on Information Security, 2007.
, “On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
,