Export 34 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
V. Conotter, Comesaña, P., and Pérez-González, F., Forensic detection of processing operator chains: recovering the history of filtered JPEG images, IEEE Transactions on Information Forensics and Security, 2015.PDF icon tifs.pdf (2.46 MB)
V. Conotter, Comesaña, P., and Pérez-González, F., Forensic analysis of full-frame linearly filtered JPEG images, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521.PDF icon conotter.pdf (780.94 KB)
V. Conotter, Comesaña, P., and Pérez-González, F., Joint detection of full-frame linear filtering and JPEG compression in digital images, in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013.PDF icon wifs13_jpeg.pdf (1.02 MB)
P. Comesaña and Pérez-González, F., Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools, in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012.PDF icon iwdw12.pdf (326.11 KB)
P. Comesaña and Pérez-González, F., The impact of the cropping attack on scalar STDM data hiding, IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.File ieee-spl06_cropping.ps (243.75 KB)
P. Comesaña and Pérez-González, F., Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol. 2007, 2007.PDF icon jis07bows.pdf (436.69 KB)File Source code available here. (8.51 MB)
P. Comesaña, Pérez-González, F., and Willems, F. M. J., Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_dpc.pdf (165.56 KB)
P. Comesaña, Balado, F., and Pérez-González, F., A Novel Interpretation of Content Authentication, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07authentication.pdf (179.34 KB)
P. Comesaña, Pérez-González, F., and Abdallah, C. T., Witsenhausen's counterexample and its links with multimedia security problems, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.PDF icon iwdw11_witsenhausen.pdf (152.97 KB)
P. Comesaña and Pérez-González, F., The optimal attack to histogram-based forensic detectors is simple(x), in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.PDF icon wifs14.pdf (265.04 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The blind Newton senstivity attack, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.File spie06_sensitivity.ps (1.62 MB)
P. Comesaña and Pérez-González, F., Dither modulation in the logarithmic domain, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.PDF icon iwdw07.pdf (183.38 KB)
P. Comesaña and Pérez-González, F., Optimal counterforensics for histogram-based forensics, in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052.PDF icon icassp13.pdf (84.89 KB)File Source code (5.47 MB)
P. Comesaña and Pérez-González, F., Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.File spie04.ps (572.73 KB)
P. Comesaña and Pérez-González, F., Two different approaches for attacking BOWS, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07bows.pdf (416.45 KB)
P. Comesaña and Pérez-González, F., Weber's law-based side-informed data hiding, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.PDF icon comesanaicassp11.pdf (119.42 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The return of the sensitivity attack, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.PDF icon iwdw05.pdf (190.47 KB)
P. Comesaña and Pérez-González, F., On the capacity of stegosystems, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.PDF icon acm07stego.pdf (198.41 KB)
P. Comesaña, Pérez-González, F., and Balado, F., Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.PDF icon icip03b.pdf (142.96 KB)
P. Comesaña, Side-informed data hiding: robustness and security analysis, University of Vigo, Spain, 2006.PDF icon thesis_pedro.pdf (2.18 MB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.PDF icon tit-2010.pdf (240.81 KB)
P. Comesaña and Pérez-González, F., Taking advantage of source correlation in forensic analysis, in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164.PDF icon mmsp13.pdf (167.27 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Fundamentals of data hiding security and their application to spread-spectrum analysis, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.PDF icon ih05_fundamentals.pdf (222.99 KB)
P. Comesaña and Pérez-González, F., On a watermarking scheme in the logarithmic domain and its perceptual advantages, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.PDF icon icip07logwat.pdf (77.03 KB)
P. Comesaña, Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.PDF icon wifs12_distinguishability.pdf (265.05 KB)