Export 306 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
Conference Paper
F. Pérez-González and Hernández, J. R., A Tutorial on Digital Watermarking, in IEEE Annual Carnahan Conference on Security Technology, Madrid, Spain, 1999.
P. Comesaña and Pérez-González, F., Two different approaches for attacking BOWS, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07bows.pdf (416.45 KB)
D. Vázquez-Padín, Mosquera, C., and Pérez-González, F., Two-dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images, in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010, pp. 1745-1748.PDF icon icip2010_dvazquez_cmosquera_fperez.pdf (1.32 MB)
F. Pérez-González and Troncoso, C., Understanding statistical disclosure: A least squares approach, in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57.PDF icon pets2012_fpg.pdf (450.58 KB)
S. Oya, Troncoso, C., and Pérez-González, F., Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks, in IEEE Workshop on Information Forensics and Security, 2014.PDF icon wifs14.pdf (347.72 KB)
J. R. Troncoso-Pastoriza, Comesaña, P., Pérez-Freire, L., and Pérez-González, F., Videosurveillance and privacy: covering the two sides of the mirror with DRM, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.PDF icon drm18-troncoso.pdf (417.17 KB)
J. R. Troncoso-Pastoriza, Comesaña, P., Pérez-Freire, L., and Pérez-González, F., Videosurveillance and privacy: covering the two sides of the mirror with DRM, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.PDF icon drm18-troncoso.pdf (417.17 KB)
N. Degara-Quintela and Pérez-González, F., Visible Encryption: Using Paper as a Secure Channel, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
P. Comesaña and Pérez-González, F., On a watermarking scheme in the logarithmic domain and its perceptual advantages, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.PDF icon icip07logwat.pdf (77.03 KB)
N. González-Prelcic, Pérez-González, F., and Domínguez-Jiménez, M. E., Wavelet Packet based subband adaptive equalization, in Baiona Workshop on Emerging Technologies in Telecommunications, Baiona, Spain, 1999.
P. Comesaña and Pérez-González, F., Weber's law-based side-informed data hiding, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.PDF icon comesanaicassp11.pdf (119.42 KB)
P. Comesaña, Pérez-González, F., and Abdallah, C. T., Witsenhausen's counterexample and its links with multimedia security problems, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.PDF icon iwdw11_witsenhausen.pdf (152.97 KB)
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., and Pun, T., Worst case additive attack against quantization-based data-hiding methods, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., and Pun, T., Worst case additive attack against quantization-based data-hiding methods, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pun, T., and Pérez-González, F., Worst case additive attack against quantization-based watermarking techniques, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pun, T., and Pérez-González, F., Worst case additive attack against quantization-based watermarking techniques, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
T. Furon and Pérez-Freire, L., Worst case attacks against binary probabilistic traitor tracing codes, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
J. R. Troncoso-Pastoriza and Pérez-González, F., Zero-Knowledge watermark detector robust to sensitivity attacks, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
Conference Proceedings
A. Tato, Henarejos, P., Mosquera, C., and Pérez-Neira, A., Link Adaptation Algorithms for Dual Polarization Mobile Satellite Systems, 9th EAI International Conference on Wireless and Satellite Systems, WISATS, vol. Wireless and Satellite Systems. Springer International Publishing, Oxford, pp. 52-61, 2017.PDF icon WiSATs2017_vf.pdf (310.76 KB)
J. A. Elices and Pérez-González, F., Locating Tor hidden services through an interval-based traffic-correlation attack, 2013 IEEE Conference on Communications and Network Security (CNS). Washington, DC, pp. 385–386, 2013.PDF icon elices_cns.pdf (174.69 KB)
T. Bianchi, Piva, A., and Pérez-González, F., Near optimal detection of quantized signals and application to JPEG forensics, 2013 IEEE International Workshop on Information Forensics and Security (WIFS). Guangzhou, China, pp. 168-173, 2013.PDF icon wifs13_bianchi.pdf (293.74 KB)
T. Bianchi, Piva, A., and Pérez-González, F., Near optimal detection of quantized signals and application to JPEG forensics, 2013 IEEE International Workshop on Information Forensics and Security (WIFS). Guangzhou, China, pp. 168-173, 2013.PDF icon wifs13_bianchi.pdf (293.74 KB)