“Efficient PRNU Matching in the Encrypted Domain”, in XoveTIC, A Coruña, Spain, 2019.
PMTP19_XoveTIC19.pdf (517.32 KB)
, 
“Number Theoretic Transforms for Secure Signal Processing”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1125-1140, 2017.
PTP17_TIFS.pdf (651.54 KB)
, 
“Camera Attribution Forensic Analyzer in the Encrypted Domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018.
PMTP18_WIFS18.pdf (655.48 KB)
, 
“Revisiting Multivariate Lattices for Encrypted Signal Processing”, in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019.
PTP19_IHMMSec19.pdf (1.67 MB)
, 
“Image denoising in the encrypted domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016.
PTP16_WIFS16.pdf (527.76 KB)
, 
“Homomorphic Lattice Cryptosystems for Secure Signal Processing”, University of Vigo, Vigo, 2019.
thesis-pedrouzo-ulloa.pdf (6.16 MB)
, 
“New Improvements in ARCO”, in Audio Engineering Society Convention (AES Convention), Munich, Germany, 1997.
, “ARCO (Adaptive Resolution COdec): A Hybrid Approach to Perceptual Audio Coding”, in Audio Engineering Society Convention (AES Convention), Copenhagen, Denmark, 1996.
, “A Diffusion-based distributed EM algorithm for density estimation in wireless sensor networks”, in Int. Conf. Acoust., Speech, Signal Process. (ICASSP), 2013.
ssp_apz_rlv_final.pdf (482.6 KB)
, 
“A Diffusion-Based EM Algorithm for Distributed Estimation in Unreliable Sensor Networks”, IEEE Signal Processing Letters, vol. 20, no. 6, pp. 595-598, 2013.
double.pdf (302.27 KB)
, 
“Distributed TLS Estimation under Random Data Faults”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Brisbane, Australia, 2015.
SSP_APZ_RLV.pdf (244.73 KB)
, 
“Parameter estimation in wireless sensor networks with faulty transducers: A distributed EM approach”, Signal Processing, vol. 144, pp. 226-237, 2018.
, “Blind decoder for binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
, “An accurate analysis of scalar quantization-based data-hiding”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, “On achievable security levels for lattice data hiding in the Known Message Attack scenario”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, “Digital Watermarking Security”, University of Vigo, Spain, 2008.
ThesisPerezFreire.pdf (4.79 MB)
, 
“Security of Spread-Spectrum-Based Data Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.
tifs06security.pdf (563.51 KB)
, 
“Secret dither estimation in lattice-quantization data hiding: a set-membership approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sme.pdf (223.01 KB)
, 
“Detection in quantization-based watermarking: performance and security issues”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_secur.pdf (401.96 KB)
, 
“Security of lattice-based data hiding against the Watermarked Only Attack”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, “Disclosing secrets in watermarking and data hiding”, in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
, “Information-theoretic analysis of security in side-informed data hiding”, in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145.
ih05_sideinformed.pdf (218.44 KB)
, 
“Spread spectrum watermarking security”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
, “Exploiting security holes in lattice data hiding”, in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.
,