Export 10 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is F [Clear All Filters]
“EM decoding of Tardos traitor tracing codes”, in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
, “Worst case attacks against binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
, “Estimating the minimal length of Tardos code”, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
, “Solving self-interference issues in a Full-Duplex radio transceiver”, 2nd XoveTIC Conference. A Coruña (Spain), 2019. xovetic19_fullduplex.pdf (577.96 KB)
, “Indoor Image Acquisition and Distribution System”, in International Symposium on Power Line Communications and Its Applications (ISPLC), 2003.
, “A low complexity all-digital DS-SS transceiver for power-line communications”, in International Symposium on Power Line Communications and Its Applications (ISPLC), 2003.
, “Source camera attribution via PRNU emphasis: Towards a generalized multiplicative model”, Signal Processing: Image Communication, vol. 114, 2023.
, “Temporal Localization of Non-Static Digital Videos Using the Electrical Network Frequency”, IEEE Signal Processing Letters, vol. 27, p. 5, 2020.
, “On the information leakage quantification of camera fingerprint estimates”, Eurasip Journal on Information Security, vol. 2021, no. 6, p. 18, 2021. bmc_article.pdf (4.19 MB)
, “A comparison of system architectures for intelligent document understanding”, Signal Processing: Image Communication, vol. 9, pp. 1-19, 1996.
,