Export 521 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
G. Boato, Fontanari, C., Natale, D. F. G. B., and Pérez-González, F., Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
L. Bondi, Pérez-González, F., Bestagini, P., and Tubaro, S., Design of projection matrices for PRNU compression, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.PDF icon 2017_prnu_projection.pdf (689.14 KB)
C
A. Casal, Serantes, C., González-Prelcic, N., and Pena, A. S., Testing a Flexible Time-Frequency Mapping for High Frequencies in TARCO (Tonal Adaptive Resolution COdec), in Audio Engineering Society Convention (AES Convention), Amsterdam, The Netherlands, 1998.
M. Caus, Pastore, A., Navarro, M., Ramírez, T., Mosquera, C., Noels, N., Alagha, N., and Perez-Neira, A. I., Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems, in 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 2018.PDF icon exploratory-analysis-superposition.pdf (288.42 KB)
D. Christopoulos, Arnau, J., Chatzinotas, S., Mosquera, C., and Ottersten, B., MMSE Performance Analysis of Generalized Multibeam Satellite Channels, Communications Letters, IEEE, pp. 1-4, 2013.PDF icon 1211.5903v1.pdf (192.05 KB)
P. Comesaña, Side-informed data hiding: robustness and security analysis, University of Vigo, Spain, 2006.PDF icon thesis_pedro.pdf (2.18 MB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.PDF icon spie08one-bit-wm.pdf (277.85 KB)
P. Comesaña, Pérez-González, F., and Liste, N., Quantization lattice estimation for multimedia forensics, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.PDF icon icip13.pdf (88.9 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The return of the sensitivity attack, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.PDF icon iwdw05.pdf (190.47 KB)
P. Comesaña, Pérez-González, F., and Abdallah, C. T., Witsenhausen's counterexample and its links with multimedia security problems, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.PDF icon iwdw11_witsenhausen.pdf (152.97 KB)
P. Comesaña and Pérez-González, F., Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.File spie04.ps (572.73 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.File iee-06bnsa.ps (1.67 MB)
P. Comesaña and Pérez-González, F., Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol. 2007, 2007.PDF icon jis07bows.pdf (436.69 KB)File Source code available here. (8.51 MB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Fundamentals of data hiding security and their application to spread-spectrum analysis, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.PDF icon ih05_fundamentals.pdf (222.99 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.PDF icon wiamis05.pdf (119.47 KB)
P. Comesaña and Pérez-González, F., Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools, in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012.PDF icon iwdw12.pdf (326.11 KB)
P. Comesaña, Pérez-González, F., and Balado, F., Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.PDF icon icip03b.pdf (142.96 KB)
P. Comesaña and Pérez-González, F., The impact of the cropping attack on scalar STDM data hiding, IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.File ieee-spl06_cropping.ps (243.75 KB)
P. Comesaña and Pérez-González, F., Dither modulation in the logarithmic domain, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.PDF icon iwdw07.pdf (183.38 KB)
P. Comesaña, Pérez-González, F., and Balado, F., On distortion-compensated Dither Modulation data-hiding with repetition coding, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.PDF icon dcdm_uvigo05.pdf (311.95 KB)
P. Comesaña, Balado, F., and Pérez-González, F., A Novel Interpretation of Content Authentication, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07authentication.pdf (179.34 KB)
P. Comesaña and Pérez-González, F., Weber's law-based side-informed data hiding, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.PDF icon comesanaicassp11.pdf (119.42 KB)
P. Comesaña, Pérez-González, F., and Balado, F., Optimal Data-Hiding Strategies for Games with BER Payoffs, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.File iwdw03.ps (499.03 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The blind Newton senstivity attack, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.File spie06_sensitivity.ps (1.62 MB)
P. Comesaña and Pérez-González, F., The optimal attack to histogram-based forensic detectors is simple(x), in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.PDF icon wifs14.pdf (265.04 KB)