“Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding”, in International Workshop on Information Hiding (IH), Santa Barbara, CA, U.S.A., 2008.
, “Distributed Estimation: Do Not Trust Gossips”, in Sensor, Signal and Information Processing (SenSIP) Workshop, Sedona (Arizona), 2008.
, “Distributed Estimation with Noisy Exchanges”, in IEEE International Workshop on Signal Processing Advances in Wireless Communications, Recife, Brazil, 2008.
, “Distributed Sequential Estimation with Noisy, Correlated Observations”, IEEE Signal Processing Letters, vol. 15, 2008.
, “Entangled Kalman Filters for Cooperative Estimation”, in IEEE Sensor Array and Multichannel Signal Processing Workshop, Darmstadt (Germany), 2008.
, “A family of frequency estimators using higher-order sample covariance lags for real sinusoid detection”, in European Signal Processing Conference (EUSIPCO), Lausanne, Switzerland, 2008.
, “Lattice implementation of Sum-squared Auto-correlation Minimization (SAM) channel shortener”, in European Signal Processing Conference (EUSIPCO), Lausanne, Switzerland, 2008.
, “Maximum Likelihood SNR Estimation for Asynchronously Oversampled OFDM Signals”, in IEEE International Workshop on Signal Processing Advances in Wireless Communications, Recife, Brazil, 2008.
, “ML and EM Algorithm for non-data-aided SNR Estimation of Linearly Modulated Signals”, in International Symposium on Communication Systems, Networks and Signal Processing (CNSDSP), 2008, pp. 530-534.
, “Non-Data-Aided Symbol Rate Estimation of Linearly Modulated Signals”, IEEE Transactions on Signal Processing, 2008.
, “Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, “Quantization-Based Methods: Additive Attacks Performance Analysis”, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, “Security of lattice-based data hiding against the Watermarked Only Attack”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, “SNR Estimation with Heterogeneous Frames”, in Advanced Satellite Mobile Systems Conference, Bologna, Italy, 2008.
, “Benford's Law in Image Processing”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007.
, “Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks”, EURASIP Journal on Information Security, vol. 2007, 2007.
jis07bows.pdf (436.69 KB)
Source code available here. (8.51 MB)
, 

“On the capacity of stegosystems”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.
acm07stego.pdf (198.41 KB)
, 
Comunicaciones Digitales. Pearson - Prentice Hall, 2007.
, “Digital Satellite Communications”, New York: Springer, 2007, p. -.
, “Digital Satellite Communications”, Springer, 2007.
, “Digital Satellite Communications”, Springer, 2007.
, “Digital Satellite Communications”, New York: Springer, 2007, p. -.
, “Disclosing secrets in watermarking and data hiding”, in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
, “On Distortion Measures Associated to Random Desynchronization Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Dither modulation in the logarithmic domain”, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.
iwdw07.pdf (183.38 KB)
, 