Export 110 results:
Author Title [ Type(Desc)] Year
Filters: Keyword is watermarking  [Clear All Filters]
Conference Paper
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., and Pun, T., Worst case additive attack against quantization-based data-hiding methods, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
T. Furon and Pérez-Freire, L., Worst case attacks against binary probabilistic traitor tracing codes, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
J. R. Troncoso-Pastoriza and Pérez-González, F., Zero-Knowledge watermark detector robust to sensitivity attacks, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
Journal Article
L. Pérez-Freire, Pérez-González, F., and Voloshynovskiy, S., An accurate analysis of scalar quantization-based data-hiding, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
M. Alvarez-Rodríguez and Pérez-González, F., Analysis of Pilot-Based Synchronization Algorithms for Watermarking of Still Images, Signal Processing: Image Communication, vol. 17, pp. 661-633, 2002.
F. Pérez-González, Hernández, J. R., and Balado, F., Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications, Signal Processing, vol. 81, pp. 1215–1238, 2001.
P. Comesaña, Merhav, N., and Barni, M., Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.PDF icon tit-2010.pdf (240.81 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.File iee-06bnsa.ps (1.67 MB)
P. Comesaña and Pérez-González, F., Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol. 2007, 2007.PDF icon jis07bows.pdf (436.69 KB)File Source code available here. (8.51 MB)
J. R. Hernández, Amado, M., and Pérez-González, F., DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure, IEEE Transactions on Image Processing, vol. 9, pp. 55–68, 2000.
P. Comesaña, Pérez-González, F., and Balado, F., On distortion-compensated Dither Modulation data-hiding with repetition coding, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.PDF icon dcdm_uvigo05.pdf (311.95 KB)
J. R. Troncoso-Pastoriza and Pérez-González, F., Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks, EURASIP Journal on Information Security, 2007.
M. Scagliola, Pérez-González, F., and Guccione, P., Gain-Invariant Dirty Paper Coding for Hierarchical OFDM, IEEE Transactions on Communications, vol. 59, pp. 3323-3334, 2011.
M. Scagliola, Pérez-González, F., and Guccione, P., High-rate data-hiding robust to linear filtering for colored hosts, EURASIP Journal on Information Security, 2009.
P. Comesaña and Pérez-González, F., The impact of the cropping attack on scalar STDM data hiding, IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.File ieee-spl06_cropping.ps (243.75 KB)
A. Abrardo, Barni, M., Pérez-González, F., and Mosquera, C., Improving the performance of RDM watermarking by means of trellis coded quantisation, IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006.
J. R. Hernández, Rodríguez, J. M., and Pérez-González, F., Improving the Performance of Spatial Watermarking of Images Using Channel Coding, Signal Processing, vol. 80, pp. 1261-1279, 2000.
B. Shebaro, Pérez-González, F., and Crandall, J. R., Leaving Timing Channel Fingerprints in Hidden Service Log Files, Digital Investigation, 2010.
J. R. Hernández, Pérez-González, F., Rodríguez, J. M., and Nieto, G., Performance Analysis of a 2D-Multipulse Amplitude Modulation Scheme for Data Hiding and Watermarking of Still Images, IEEE Journal on Selected Areas in Communications, vol. 16, pp. 510–524, 1998.
F. Pérez-González, Balado, F., and Hernández, J. R., Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels, IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
G. Domínguez-Conde, Comesaña, P., and Pérez-González, F., Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.PDF icon tifs09performanceanalysis.pdf (232.67 KB)
F. Pérez-González and Mosquera, C., Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., and Pun, T., Quantization-Based Methods: Additive Attacks Performance Analysis, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
F. Pérez-González, Mosquera, C., Barni, M., and Abrardo, A., Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
O. Koval, Voloshynovskiy, S., Vila-Forcén, J. E., Pérez-González, F., Deguillaume, F., and Pun, T., Robustness Improvement of Known-Host-State Watermarking Using Host Statistics, Signal Processing, vol. 86, pp. 1076-1088, 2006.