Export 117 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
T. Ramírez, Mosquera, C., Caus, M., Pastore, A., Alagha, N., and Noels, N., Adjacent Beams Resource Sharing to Serve Hot Spots : A Rate Splitting Approach, in 36th International Communications Satellite Systems Conference (ICSSC), Niagara Falls, Canada, 2018.PDF icon ADJACENT_BEAMS_RESOURCE_SHARING_TO_SERVE_HOT_SPOTS_A_RATE_SPLITTING_APPROACH.pdf (756.71 KB)
P. Comesaña, Pérez-González, F., and Willems, F. M. J., Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_dpc.pdf (165.56 KB)
M. Barni, Comesaña, P., Pérez-González, F., and Tondi, B., Are you threatening me? Towards smart detectors in watermarking, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.PDF icon spie14_2.0.pdf (430.73 KB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.PDF icon spie08one-bit-wm.pdf (277.85 KB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.PDF icon tit-2010.pdf (240.81 KB)
B
J. F. Schmidt, Cousseau, J. E., Wichman, R., and Werner, S., Bit Loading Using Imperfect CSIT for Prediction-Based Resource Allocation in Mobile OFDMA, Vehicular Technology, IEEE Transactions on, vol. 60, pp. 4082 -4088, 2011.
F. Balado, Pérez-González, F., and Comesaña, P., Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.PDF icon spie04em.pdf (434.03 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.File iee-06bnsa.ps (1.67 MB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The blind Newton senstivity attack, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.File spie06_sensitivity.ps (1.62 MB)
J. R. Troncoso-Pastoriza and Caputo, S., Bootstrap-based Proxy Reencryption for Private Multi-user Computing, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.PDF icon TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
P. Comesaña and Pérez-González, F., Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol. 2007, 2007.PDF icon jis07bows.pdf (436.69 KB)File Source code available here. (8.51 MB)
C
P. Comesaña and Pérez-González, F., On the capacity of stegosystems, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.PDF icon acm07stego.pdf (198.41 KB)
N. González-Prelcic, Mosquera, C., Degara-Quintela, N., and Currais, A., A Channel Model for the Galician Low Voltage Main Network, in International Symposium on Power Line Communications and Its Applications (ISPLC), Malmo, Sweden, 2001.
J. F. Schmidt, Costas-Sanz, S., and López-Valcarce, R., Choose Your Subcarriers Wisely: Active Interference Cancellation for Cognitive OFDM, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 4, pp. 615-625, 2013.PDF icon spectrumshaping_final.pdf (3.05 MB)
R. Elasmi-Ksibi, Cherif, S., López-Valcarce, R., and Besbes, H., Closed-form real single-tone frequency estimator based on a normalized IIR notch filter, Signal Processing, vol. 90, pp. 1905-1915, 2010.PDF icon ieee_version_finale_july_2008.pdf (193.5 KB)
S. Vicini, Alberti, F., Notario, N., Crespo, A., Troncoso-Pastoriza, J. R., and Sanna, A., Co-creating Security-and-Privacy-by-Design Systems, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
J. Muñoz, Vales-Alonso, J., Quiñoy-García, F., Costas-Sanz, S., Pillado, M., González-Castaño, F. J., García-Sanchez, M., López-Valcarce, R., and López-Bravo, C., A Cognitive Mobile BTS Solution with Software-Defined Radioelectric Sensing, Sensors, vol. 13, no. 2, pp. 2051-2075, 2013.PDF icon sensors-13-02051.pdf (2.93 MB)
A. Artés-Rodríguez, Pérez-González, F., Cid-Sueiro, J., López-Valcarce, R., Mosquera, C., and Pérez-Cruz, F., Comunicaciones Digitales. Pearson - Prentice Hall, 2007.
D
P. Comesaña, Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.PDF icon wifs12_distinguishability.pdf (265.05 KB)
L. Pérez-Freire, Comesaña, P., and Pérez-González, F., Detection in quantization-based watermarking: performance and security issues, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_secur.pdf (401.96 KB)
D. Vázquez-Padín, Fontani, M., Bianchi, T., Comesaña, P., Piva, A., and Barni, M., Detection of video double encoding with GOP size estimation, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156.PDF icon wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
A. A. Rontogiannis, Álvarez-Díaz, M., Casadei, M., Dalakas, V., Duverdier, A., González-Serrano, F. J., Iubatti, M., Javornik, T., Lapierre, L., Neri, M., and Salmi, P., Digital Satellite Communications, New York: Springer, 2007, p. -.
S. Scalise, Castanet, L., Luglio, M., Neri, M., Álvarez-Díaz, M., Bito, J., Bousquet, M., Frigyes, I., Horvath, P., Jahn, A., Krejcarek, M., Lemorton, J., Morosi, S., and Vázquez-Castro, M. A., Digital Satellite Communications, New York: Springer, 2007, p. -.
C. Mosquera, Boucheret, M. L., Bousquet, M., Cioni, S., Gappmair, W., Pedone, R., Scalise, S., Skoutaridis, P., and Villanti, M., Digital Satellite Communications, Springer, 2007.
B. Mathon, Bas, P., Cayre, F., and Pérez-González, F., Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding, in International Workshop on Information Hiding (IH), Santa Barbara, CA, U.S.A., 2008.