“The optimal attack to histogram-based forensic detectors is simple(x)”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.
wifs14.pdf (265.04 KB)
, 
“The blind Newton senstivity attack”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sensitivity.ps (1.62 MB)
, 
“On the capacity of stegosystems”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.
acm07stego.pdf (198.41 KB)
, 
“Optimal counterforensics for histogram-based forensics”, in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052.
icassp13.pdf (84.89 KB)
Source code (5.47 MB)
, 

“Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains”, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.
wifs12_distinguishability.pdf (265.05 KB)
, 
“Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
“Two different approaches for attacking BOWS”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07bows.pdf (416.45 KB)
, 
“Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime”, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.
tit-2010.pdf (240.81 KB)
, 
“Taking advantage of source correlation in forensic analysis”, in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164.
mmsp13.pdf (167.27 KB)
, 
“On a watermarking scheme in the logarithmic domain and its perceptual advantages”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
icip07logwat.pdf (77.03 KB)
, 
“Joint detection of full-frame linear filtering and JPEG compression in digital images”, in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013.
wifs13_jpeg.pdf (1.02 MB)
, 
“Forensic analysis of full-frame linearly filtered JPEG images”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521.
conotter.pdf (780.94 KB)
, 
“Forensic detection of processing operator chains: recovering the history of filtered JPEG images”, IEEE Transactions on Information Forensics and Security, 2015.
tifs.pdf (2.46 MB)
, 
“On the Role of Differentiation for Resampling Detection”, in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010.
, “Visible Encryption: Using Paper as a Secure Channel”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “Joint Linear Precoding and Beamforming for the Forward Link of Multi-Beam Broadband Satellite Systems”, in IEEE GLOBECOM, Houston, Texas, USA, 2011.
devi1112_joint.pdf (143.58 KB)
, 
“Interference cancellation and blind equalization for linear multi-user systems”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Istanbul, Turkey, 2000, vol. 1, pp. 145–148.
, “Flat Fading Channel Estimation Based on Dirty Paper Coding”, University of Vigo, Vigo, 2016.
thesis_gdomin.pdf (2.52 MB)
, 
“Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.
tifs09performanceanalysis.pdf (232.67 KB)
, 
“Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
icip09domcomper.pdf (129.76 KB)
, 
“Improving the Visual Performance of S/DISCUS”, in IEEE International Conference on Multimedia and Expo (ICME), Barcelona, Catalonia, 2011.
, “A New Look At ML Step-Size Estimation for Scalar Costa Scheme Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014.
icip14.pdf (158.08 KB)
, 
“Flat Fading Channel Estimation Based on Dirty Paper Coding”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014.
icassp14_gdc_pca_fpg.pdf (154.64 KB)
, 
“Linear Boundary Extensions for Finite Length Signals and Paraunitary Two-Channel Filter Banks”, IEEE Transactions on Signal Processing, vol. 52, pp. 3213-3226, 2004.
, “Orthogonal Extensions of AR Processes without Artificial Discontinuities for Size-Limites Filter Banks”, in IEEE Workshop on Statistical Signal Processing (SSP), Singapur, 2001.
,