Export 608 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
P. Comesaña and Pérez-González, F., Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools, in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012.PDF icon iwdw12.pdf (326.11 KB)
P. Comesaña, Pérez-González, F., and Balado, F., Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.PDF icon icip03b.pdf (142.96 KB)
P. Comesaña and Pérez-González, F., The impact of the cropping attack on scalar STDM data hiding, IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.File ieee-spl06_cropping.ps (243.75 KB)
P. Comesaña and Pérez-González, F., Dither modulation in the logarithmic domain, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.PDF icon iwdw07.pdf (183.38 KB)
P. Comesaña, Pérez-González, F., and Balado, F., On distortion-compensated Dither Modulation data-hiding with repetition coding, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.PDF icon dcdm_uvigo05.pdf (311.95 KB)
P. Comesaña, Balado, F., and Pérez-González, F., A Novel Interpretation of Content Authentication, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07authentication.pdf (179.34 KB)
P. Comesaña and Pérez-González, F., Weber's law-based side-informed data hiding, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.PDF icon comesanaicassp11.pdf (119.42 KB)
P. Comesaña, Pérez-González, F., and Balado, F., Optimal Data-Hiding Strategies for Games with BER Payoffs, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.File iwdw03.ps (499.03 KB)
P. Comesaña and Pérez-González, F., The optimal attack to histogram-based forensic detectors is simple(x), in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.PDF icon wifs14.pdf (265.04 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The blind Newton senstivity attack, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.File spie06_sensitivity.ps (1.62 MB)
P. Comesaña and Pérez-González, F., On the capacity of stegosystems, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.PDF icon acm07stego.pdf (198.41 KB)
P. Comesaña and Pérez-González, F., Optimal counterforensics for histogram-based forensics, in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052.PDF icon icassp13.pdf (84.89 KB)File Source code (5.47 MB)
P. Comesaña, Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.PDF icon wifs12_distinguishability.pdf (265.05 KB)
P. Comesaña, Pérez-González, F., and Willems, F. M. J., Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_dpc.pdf (165.56 KB)
P. Comesaña and Pérez-González, F., Two different approaches for attacking BOWS, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07bows.pdf (416.45 KB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.PDF icon tit-2010.pdf (240.81 KB)
P. Comesaña and Pérez-González, F., Taking advantage of source correlation in forensic analysis, in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164.PDF icon mmsp13.pdf (167.27 KB)
P. Comesaña and Pérez-González, F., On a watermarking scheme in the logarithmic domain and its perceptual advantages, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.PDF icon icip07logwat.pdf (77.03 KB)
D. Christopoulos, Arnau, J., Chatzinotas, S., Mosquera, C., and Ottersten, B., MMSE Performance Analysis of Generalized Multibeam Satellite Channels, Communications Letters, IEEE, pp. 1-4, 2013.PDF icon 1211.5903v1.pdf (192.05 KB)
M. Chowdhury, Manolakos, A., Gomez-Cuba, F., Erkip, E., and Goldsmith, A. J., Capacity scaling in noncoherent wideband massive SIMO systems, in IEEE Information Theory Workshop (ITW), 2015.
M. Caus, Pastore, A., Navarro, M., Ramírez, T., Mosquera, C., Noels, N., Alagha, N., and Perez-Neira, A. I., Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems, in 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 2018.PDF icon exploratory-analysis-superposition.pdf (288.42 KB)
A. Casal, Serantes, C., González-Prelcic, N., and Pena, A. S., Testing a Flexible Time-Frequency Mapping for High Frequencies in TARCO (Tonal Adaptive Resolution COdec), in Audio Engineering Society Convention (AES Convention), Amsterdam, The Netherlands, 1998.
B
J. Borràs, Molina, F., López-Valcarce, R., and Sala, J., Energy-efficient analog beamforming with short packets in millimeter-wave MIMO systems, in 2020 54th Asilomar Conference on Signals, Systems, and Computers, California, 2020, Virtual event, 2020.PDF icon Asilomar2020.pdf (353.1 KB)
L. Bondi, Bestagini, P., Pérez-González, F., and Tubaro, S., Improving PRNU Compression Through Preprocessing, Quantization, and Coding, IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, p. 13, 2019.PDF icon 2018_prnu_resize_deadzone.pdf (3.81 MB)
L. Bondi, Pérez-González, F., Bestagini, P., and Tubaro, S., Design of projection matrices for PRNU compression, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.PDF icon 2017_prnu_projection.pdf (689.14 KB)