“Detection of Rank-P Signals in Cognitive Radio Networks With Uncalibrated Multiple Antennas”, IEEE Trans. on Signal Processing, vol. 59, no. 8, pp. 3764-3774, 2011. manuscript.pdf (587.54 KB)
, “Model-based steganalysis using invariant features”, in Media Forensics and Security, San Jose, CA, U.S.A., 2009.
, “Improved Binary Dither-Modulation with perceptual constraints”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, Portugal, 2004. wiamis04_dm.ps (268.36 KB)
, “Least Squares Disclosure Attacks: User Profiling for Mix-based Anonymous Communication Systems”, University of Vigo, Vigo, 2013. lssda-main-tifs.pdf (516.78 KB)
, “Ensuring Gain Invariance in High-Rate Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Understanding statistical disclosure: A least squares approach”, in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57. pets2012_fpg.pdf (450.58 KB)
, “The Importance of aliasing in structured quantization index modulation data hiding (invited lecture)”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 1-17.
, “Misconvergence and stabilization of adaptive IIR lattice filters”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Istanbul, Turkey, 2000, vol. 1, pp. 65–68.
, “Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, “PRNU-leaks: facts and remedies”, in 2020 28th European Signal Processing Conference (EUSIPCO), Virtual Event Amsterdam, 2020.
, “Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation”, in International Workshop on Information Hiding (IH), Noorwijkerhout, The Netherlands, 2002.
, “PRNU-leaks: facts and remedies”, in 2020 28th European Signal Processing Conference (EUSIPCO), 2021, pp. 720-724.
, “Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03a.pdf (145.04 KB)
, “Characterization and Algebraic Solution to the Extreme-Point Robust SPR Problem”, in IFAC World Congress, San Francisco, CA, USA, 1996, pp. 391-396.
, “Road vehicle speed estimation from a two-microphone array”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Orlando, FL, USA, 2002, vol. 2, pp. 1321–1324.
, “Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications”, Signal Processing, vol. 81, pp. 1215–1238, 2001.
, “High-rate quantization data hiding robust to arbitrary linear filtering attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, “Improving Data Hiding Performance by Using Quantization in a Projected Domain”, in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, “Benford's Law in Image Processing”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007.
, “Algebraic LTI Filter Synthesis for Simultaneously Making a Convex Combination of Discrete-Time Plants SPR”, in IEEE Conference on Decision and Control (CDC), New Orleans, LA, 1995, pp. 780-781.
, “Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, “Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior”, 2014. techrep.pdf (267.69 KB)
, “A Generalization of Benford's Law and Its Application to Images”, in European Control Conference (ECC), Kos, Greece, 2007.
, “A Least Squares approach to user profiling in pool mix-based anonymous communication systems.”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 115–120. wifs2012_pg.pdf (321.08 KB)
,