Export 111 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is watermarking  [Clear All Filters]
2009
G. Domínguez-Conde, Comesaña, P., and Pérez-González, F., Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.PDF icon icip09domcomper.pdf (129.76 KB)
G. Domínguez-Conde, Comesaña, P., and Pérez-González, F., Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.PDF icon tifs09performanceanalysis.pdf (232.67 KB)
J. R. Troncoso-Pastoriza, Comesaña, P., and Pérez-González, F., Secure Direct and Iterative Protocols for Solving Systems of Linear Equations, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.PDF icon secure_sle_speedws09.pdf (193.97 KB)
J. R. Troncoso-Pastoriza and Pérez-González, F., Skewed Log-Stable model for natural images pixel block-variance, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
L. Pérez-Freire and Pérez-González, F., Spread spectrum watermarking security, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
J. R. Troncoso-Pastoriza, Comesaña, P., Pérez-Freire, L., and Pérez-González, F., Videosurveillance and privacy: covering the two sides of the mirror with DRM, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.PDF icon drm18-troncoso.pdf (417.17 KB)
T. Furon and Pérez-Freire, L., Worst case attacks against binary probabilistic traitor tracing codes, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
2007
P. Comesaña and Pérez-González, F., Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol. 2007, 2007.PDF icon jis07bows.pdf (436.69 KB)File Source code available here. (8.51 MB)
P. Comesaña and Pérez-González, F., On the capacity of stegosystems, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.PDF icon acm07stego.pdf (198.41 KB)
L. Pérez-Freire and Pérez-González, F., Disclosing secrets in watermarking and data hiding, in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
F. Balado and Pérez-González, F., On Distortion Measures Associated to Random Desynchronization Attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
P. Comesaña and Pérez-González, F., Dither modulation in the logarithmic domain, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.PDF icon iwdw07.pdf (183.38 KB)
J. R. Troncoso-Pastoriza and Pérez-González, F., Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
J. R. Troncoso-Pastoriza and Pérez-González, F., Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks, EURASIP Journal on Information Security, 2007.
L. Pérez-Freire and Pérez-González, F., Exploiting security holes in lattice data hiding, in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.
P. Comesaña, Balado, F., and Pérez-González, F., A Novel Interpretation of Content Authentication, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07authentication.pdf (179.34 KB)
L. Pérez-Freire, Practical estimators of the secret spreading vector for Improved Spread Spectrum modulations. Statistical analysis and results. Signal Theory and Communications Department, University of Vigo, Spain, 2007.
J. R. Troncoso-Pastoriza, Katzenbeisser, S., and Celik, M., Privacy Preserving Error Resilient DNA Searching through Oblivious Automata, in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
M. Barni, Pérez-González, F., Comesaña, P., and Bartoli, G., Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.PDF icon icassp07reproducible.pdf (67.03 KB)
J. R. Troncoso-Pastoriza, Katzenbeisser, S., Celik, M., and Lemma, A., A Secure Multidimensional Point Inclusion Protocol, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
L. Pérez-Freire, Moulin, P., and Pérez-González, F., Security of Spread-Spectrum-Based Data Hiding, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.