“Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
, “Improving PRNU Compression Through Preprocessing, Quantization, and Coding”, IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, p. 13, 2019.
2018_prnu_resize_deadzone.pdf (3.81 MB)
, 
“Design of projection matrices for PRNU compression”, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.
2017_prnu_projection.pdf (689.14 KB)
, 
“Energy-efficient analog beamforming with short packets in millimeter-wave MIMO systems”, in 2020 54th Asilomar Conference on Signals, Systems, and Computers, California, 2020, Virtual event, 2020.
Asilomar2020.pdf (353.1 KB)
, 
“Testing a Flexible Time-Frequency Mapping for High Frequencies in TARCO (Tonal Adaptive Resolution COdec)”, in Audio Engineering Society Convention (AES Convention), Amsterdam, The Netherlands, 1998.
, “Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems”, in 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 2018.
exploratory-analysis-superposition.pdf (288.42 KB)
, 
“MMSE Performance Analysis of Generalized Multibeam Satellite Channels”, Communications Letters, IEEE, pp. 1-4, 2013.
1211.5903v1.pdf (192.05 KB)
, 
“Side-informed data hiding: robustness and security analysis”, University of Vigo, Spain, 2006.
thesis_pedro.pdf (2.18 MB)
, 
“Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.
spie08one-bit-wm.pdf (277.85 KB)
, 
“Quantization lattice estimation for multimedia forensics”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.
icip13.pdf (88.9 KB)
, 
“The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.
iwdw05.pdf (190.47 KB)
, 
“Witsenhausen's counterexample and its links with multimedia security problems”, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.
iwdw11_witsenhausen.pdf (152.97 KB)
, 
“Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.
spie04.ps (572.73 KB)
, 
“Blind Newton Sensitivity Attack”, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.
iee-06bnsa.ps (1.67 MB)
, 
“Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks”, EURASIP Journal on Information Security, vol. 2007, 2007.
jis07bows.pdf (436.69 KB)
Source code available here. (8.51 MB)
, 

“Fundamentals of data hiding security and their application to spread-spectrum analysis”, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.
ih05_fundamentals.pdf (222.99 KB)
, 
“An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.
wiamis05.pdf (119.47 KB)
, 
“Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools”, in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012.
iwdw12.pdf (326.11 KB)
, 
“Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.
icip03b.pdf (142.96 KB)
, 
“The impact of the cropping attack on scalar STDM data hiding”, IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.
ieee-spl06_cropping.ps (243.75 KB)
, 
“Dither modulation in the logarithmic domain”, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.
iwdw07.pdf (183.38 KB)
, 
“On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.
dcdm_uvigo05.pdf (311.95 KB)
, 
“A Novel Interpretation of Content Authentication”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07authentication.pdf (179.34 KB)
, 
“Weber's law-based side-informed data hiding”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.
comesanaicassp11.pdf (119.42 KB)
, 
“Optimal Data-Hiding Strategies for Games with BER Payoffs”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.
iwdw03.ps (499.03 KB)
, 