Export 78 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is B [Clear All Filters]
“On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
, “Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03a.pdf (145.04 KB)
, “DNN Watermarking: Four Challenges and a Funeral”, in 2021 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC'21, Virtual Event Belgium, 2021, pp. 189-196. ihmm13-barniA.pdf (515.94 KB)
, “Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE”, in International Conference on Security and Cryptography for Networks (SCN), 2020. BEPST20-SCN20.pdf (457.81 KB)
, “Efficient protocols for oblivious linear function evaluation from ring-LWE”, Journal of Computer Security, vol. 30, no. 1, p. 40, 2022.
, “Energy-efficient analog beamforming with short packets in millimeter-wave MIMO systems”, in 2020 54th Asilomar Conference on Signals, Systems, and Computers, California, 2020, Virtual event, 2020. Asilomar2020.pdf (353.1 KB)
, “Ensuring Gain Invariance in High-Rate Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “A family of frequency estimators using higher-order sample covariance lags for real sinusoid detection”, in European Signal Processing Conference (EUSIPCO), Lausanne, Switzerland, 2008.
, “A finite interval constant modulus criterion for multicarrier channel shortening”, in European Wireless, Lucca, Italy, 2010.
, “Forensics of high quality and nearly identical JPEG image recompression”, in ACM Workshop on Information Hiding and Multimedia Security, 2016. HQ_multipleJPEG.pdf (1.33 MB)
, “Forensics of high quality and nearly identical JPEG image recompression”, in ACM Workshop on Information Hiding and Multimedia Security, 2016. HQ_multipleJPEG.pdf (1.33 MB)
, “Frequency estimation of real-valued single-tone in colored noise using multiple autocorrelation lags”, Signal Processing, vol. 90, pp. 2303-2307, 2010. colored_noise_letter.pdf (111 KB)
, “Full-stack Hybrid Beamforming in mmWave 5G Networks”, in 2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet), 2021, pp. 1–7.
, “Fundamentals of data hiding security and their application to spread-spectrum analysis”, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, “Gpu-Accelerated Sift-Aided Source Identification of Stabilized Videos”, in 2022 IEEE International Conference on Image Processing (ICIP), 2022, pp. 2616-2620. Gpu-Accelerated.pdf (5.05 MB)
, “Hexagonal Quantizers are not Optimal for 2-D Data Hiding”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “Hybrid Space-Ground Processing for High-Capacity Multi-beam Satellite Systems”, in IEEE GLOBECOM, Houston, Texas, USA, 2011. arna1112hybrid.pdf (182.79 KB)
, “Improving Data Hiding Performance by Using Quantization in a Projected Domain”, in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, “Improving PRNU Compression Through Preprocessing, Quantization, and Coding”, IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, p. 13, 2019. 2018_prnu_resize_deadzone.pdf (3.81 MB)
, “Improving PRNU Compression Through Preprocessing, Quantization, and Coding”, IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, p. 13, 2019. 2018_prnu_resize_deadzone.pdf (3.81 MB)
, “Improving the performance of RDM watermarking by means of trellis coded quantisation”, IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006.
, “Information Forensics and Security: A quarter-century-long journey”, IEEE Signal Processing Magazine, vol. 40, pp. 67-79, 2023.
, “Information-theoretic analysis of security in side-informed data hiding”, in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145. ih05_sideinformed.pdf (218.44 KB)
, “Lattice implementation of adaptive channel shortening in multicarrier transmission over IIR channels”, EURASIP Journal on Advances in Signal Processing, vol. 2013:174, 2013.
, “Lattice implementation of Sum-squared Auto-correlation Minimization (SAM) channel shortener”, in European Signal Processing Conference (EUSIPCO), Lausanne, Switzerland, 2008.
,