“Number Theoretic Transforms for Secure Signal Processing”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1125-1140, 2017. PTP17_TIFS.pdf (651.54 KB)
, “Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation”, in IEEE International Workshop on Information Forensics and Security (WIFS), 2020. PTGGP20-WIFS20.pdf (645.17 KB)
, “Secure Collaborative Camera Attribution”, in European Interdisciplinary Cybersecurity Conference (EICC), Barcelona, Spain, 2022, pp. 97-98.
, “Camera Attribution Forensic Analyzer in the Encrypted Domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018. PMTP18_WIFS18.pdf (655.48 KB)
, “Revisiting Multivariate Lattices for Encrypted Signal Processing”, in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019. PTP19_IHMMSec19.pdf (1.67 MB)
, “Multiquadratic rings and oblivious linear function evaluation”, TEMat monográficos, vol. 2, no. Proceedings of the 3rd BYMAT Conference, pp. 83-86, 2021. P21-TM21.pdf (592.53 KB)
, “Image denoising in the encrypted domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016. PTP16_WIFS16.pdf (527.76 KB)
, “Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation”, in IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023, pp. 612-617.
, “Homomorphic Lattice Cryptosystems for Secure Signal Processing”, University of Vigo, Vigo, 2019. thesis-pedrouzo-ulloa.pdf (6.16 MB)
, “New Improvements in ARCO”, in Audio Engineering Society Convention (AES Convention), Munich, Germany, 1997.
, “ARCO (Adaptive Resolution COdec): A Hybrid Approach to Perceptual Audio Coding”, in Audio Engineering Society Convention (AES Convention), Copenhagen, Denmark, 1996.
, “A Diffusion-based distributed EM algorithm for density estimation in wireless sensor networks”, in Int. Conf. Acoust., Speech, Signal Process. (ICASSP), 2013. ssp_apz_rlv_final.pdf (482.6 KB)
, “A Diffusion-Based EM Algorithm for Distributed Estimation in Unreliable Sensor Networks”, IEEE Signal Processing Letters, vol. 20, no. 6, pp. 595-598, 2013. LSP2260329.pdf (326.39 KB)
, “Distributed TLS Estimation under Random Data Faults”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Brisbane, Australia, 2015. SSP_APZ_RLV.pdf (244.73 KB)
, “Parameter estimation in wireless sensor networks with faulty transducers: A distributed EM approach”, Signal Processing, vol. 144, pp. 226-237, 2018.
, “Blind decoder for binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
, “An accurate analysis of scalar quantization-based data-hiding”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, “On achievable security levels for lattice data hiding in the Known Message Attack scenario”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, “Digital Watermarking Security”, University of Vigo, Spain, 2008. ThesisPerezFreire.pdf (4.79 MB)
, “Security of Spread-Spectrum-Based Data Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, “Secret dither estimation in lattice-quantization data hiding: a set-membership approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, “Detection in quantization-based watermarking: performance and security issues”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, “Security of lattice-based data hiding against the Watermarked Only Attack”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, “Disclosing secrets in watermarking and data hiding”, in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
,