Export 60 results:
Author Title [ Type] Year Filters: First Letter Of Title is D [Clear All Filters]
“Digital Watermarking Security”, University of Vigo, Spain, 2008. ThesisPerezFreire.pdf (4.79 MB)
, “Digital image data hiding using side information”, University of Vigo, Spain, 2003.
, “Detection of Image Resampling and Video Encoding Footprints for Forensic Applications”, University of Vigo, Vigo, 2016. thesis_dvazquez_fperez.pdf (5.65 MB)
, , “Dynamic spectrum leasing (DSL): A new paradigm for spectrum sharing in cognitive radio networks”, IEEE Transactions on Vehicular Technology, vol. 59, pp. 2328-2339, 2010. jayaweeravazquezmosquera2010.pdf (365.85 KB)
, “Distributed Sequential Estimation with Noisy, Correlated Observations”, IEEE Signal Processing Letters, vol. 15, 2008.
, “Distributed Precoding Systems in Multi-Gateway Multibeam Satellites: Regularization and Coarse Beamforming”, IEEE Transactions on Wireless Communication, 2018. TWC2859410_dissemination_version.pdf (719.84 KB)
, “On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
, “A Diffusion-Based EM Algorithm for Distributed Estimation in Unreliable Sensor Networks”, IEEE Signal Processing Letters, vol. 20, no. 6, pp. 595-598, 2013. LSP2260329.pdf (326.39 KB)
, “Detection of Rank-P Signals in Cognitive Radio Networks With Uncalibrated Multiple Antennas”, IEEE Trans. on Signal Processing, vol. 59, no. 8, pp. 3764-3774, 2011. manuscript.pdf (587.54 KB)
, “Designing incoherent frames through convex techniques for optimized compressed sensing”, IEEE Transactions on Signal Processing, vol. 64, no. 9, pp. 2334-2344, 2016.
, “Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016. TNET2547391_author_version.pdf (1.96 MB)
, “On the design of a novel two-objective harmony search approach for distance- and connectivity-based localization in wireless sensor networks”, Engineering Applications of Artificial Intelligence, vol. 26, no. 2, pp. 669-676, 2013. eaai2013.pdf (533.7 KB)
, “DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure”, IEEE Transactions on Image Processing, vol. 9, pp. 55–68, 2000.
, “Data Hiding Robust to Mobile Communication Vocoders”, IEEE Transactions on Multimedia, vol. 18, no. 12, pp. 2345-2357, 2016. TMM2599149.pdf (3.04 MB)
, “Dynamic Spectrum Leasing (DSL) in Dynamic Channels”, in ICC Workshop on Cognitive Radio Interfaces and Signal Processing (ICC CRISP), Cape Town, South Africa, 2010.
, “A Dynamic Spectrum Leasing (DSL) Framework for Spectrum Sharing in Cognitive Radio Networks”, in Asilomar Conference on Signals, Systems and Computers, 2009.
, “Dynamic Privacy-Preserving Genomic Susceptibility Testing”, in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50. IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, “A Dynamic Codebook Design for Analog Beamforming in MIMO LEO Satellite Communications”, in IEEE International Conference on Communications (ICC), 2022. 2111.08655.pdf (1.49 MB)
, “Dynamic Attribute-Based Privacy-Preserving Genomic Susceptibility Testing”, in 34th Annual ACM Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, 2019. SAC19Final.pdf (745.27 KB)
, “DVB-S Air Interface over Railroad Satellite Channel: Performance and Extensions”, in Baiona Workshop on Signal Processing in Communications, Baiona, Spain, 2003.
, “Do dummies pay off? Limits of dummy traffic protection in anonymous communications”, in Privacy Enhancing Technologies Symposium, 2014. pets14.pdf (421.61 KB) Matlab files used to perform the experiments in the paper. (5.55 KB)
, “DNN Watermarking: Four Challenges and a Funeral”, in 2021 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC'21, Virtual Event Belgium, 2021, pp. 189-196. ihmm13-barniA.pdf (515.94 KB)
, “Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03a.pdf (145.04 KB)
, “Dither modulation in the logarithmic domain”, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264. iwdw07.pdf (183.38 KB)
,