“Dither modulation in the logarithmic domain”, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.
iwdw07.pdf (183.38 KB)
, 
“On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.
dcdm_uvigo05.pdf (311.95 KB)
, 
“A Novel Interpretation of Content Authentication”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07authentication.pdf (179.34 KB)
, 
“Weber's law-based side-informed data hiding”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.
comesanaicassp11.pdf (119.42 KB)
, 
“Optimal Data-Hiding Strategies for Games with BER Payoffs”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.
iwdw03.ps (499.03 KB)
, 
“The optimal attack to histogram-based forensic detectors is simple(x)”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.
wifs14.pdf (265.04 KB)
, 
“The blind Newton senstivity attack”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sensitivity.ps (1.62 MB)
, 
“Optimal counterforensics for histogram-based forensics”, in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052.
icassp13.pdf (84.89 KB)
Source code (5.47 MB)
, 

“On the capacity of stegosystems”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.
acm07stego.pdf (198.41 KB)
, 
“Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains”, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.
wifs12_distinguishability.pdf (265.05 KB)
, 
“Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
“Two different approaches for attacking BOWS”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07bows.pdf (416.45 KB)
, 
“Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime”, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.
tit-2010.pdf (240.81 KB)
, 
“Taking advantage of source correlation in forensic analysis”, in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164.
mmsp13.pdf (167.27 KB)
, 
“On a watermarking scheme in the logarithmic domain and its perceptual advantages”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
icip07logwat.pdf (77.03 KB)
, 
“MMSE Performance Analysis of Generalized Multibeam Satellite Channels”, Communications Letters, IEEE, pp. 1-4, 2013.
1211.5903v1.pdf (192.05 KB)
, 
“Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems”, in 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 2018.
exploratory-analysis-superposition.pdf (288.42 KB)
, 
“Testing a Flexible Time-Frequency Mapping for High Frequencies in TARCO (Tonal Adaptive Resolution COdec)”, in Audio Engineering Society Convention (AES Convention), Amsterdam, The Netherlands, 1998.
, “Energy-efficient analog beamforming with short packets in millimeter-wave MIMO systems”, in 2020 54th Asilomar Conference on Signals, Systems, and Computers, California, 2020, Virtual event, 2020.
Asilomar2020.pdf (353.1 KB)
, 
“Improving PRNU Compression Through Preprocessing, Quantization, and Coding”, IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, p. 13, 2019.
2018_prnu_resize_deadzone.pdf (3.81 MB)
, 
“Design of projection matrices for PRNU compression”, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.
2017_prnu_projection.pdf (689.14 KB)
, 
“Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
, “Near optimal detection of quantized signals and application to JPEG forensics”, 2013 IEEE International Workshop on Information Forensics and Security (WIFS). Guangzhou, China, pp. 168-173, 2013.
wifs13_bianchi.pdf (293.74 KB)
, 
“Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.
icassp07reproducible.pdf (67.03 KB)
, 
“Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 