Export 117 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Conference Paper
T. Ramírez, Mosquera, C., Caus, M., Pastore, A., Alagha, N., and Noels, N., Adjacent Beams Resource Sharing to Serve Hot Spots : A Rate Splitting Approach, in 36th International Communications Satellite Systems Conference (ICSSC), Niagara Falls, Canada, 2018.PDF icon ADJACENT_BEAMS_RESOURCE_SHARING_TO_SERVE_HOT_SPOTS_A_RATE_SPLITTING_APPROACH.pdf (756.71 KB)
P. Comesaña, Pérez-González, F., and Willems, F. M. J., Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_dpc.pdf (165.56 KB)
M. Barni, Comesaña, P., Pérez-González, F., and Tondi, B., Are you threatening me? Towards smart detectors in watermarking, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.PDF icon spie14_2.0.pdf (430.73 KB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.PDF icon spie08one-bit-wm.pdf (277.85 KB)
F. Balado, Pérez-González, F., and Comesaña, P., Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.PDF icon spie04em.pdf (434.03 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The blind Newton senstivity attack, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.File spie06_sensitivity.ps (1.62 MB)
J. R. Troncoso-Pastoriza and Caputo, S., Bootstrap-based Proxy Reencryption for Private Multi-user Computing, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.PDF icon TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
P. Comesaña and Pérez-González, F., On the capacity of stegosystems, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.PDF icon acm07stego.pdf (198.41 KB)
N. González-Prelcic, Mosquera, C., Degara-Quintela, N., and Currais, A., A Channel Model for the Galician Low Voltage Main Network, in International Symposium on Power Line Communications and Its Applications (ISPLC), Malmo, Sweden, 2001.
S. Vicini, Alberti, F., Notario, N., Crespo, A., Troncoso-Pastoriza, J. R., and Sanna, A., Co-creating Security-and-Privacy-by-Design Systems, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
P. Comesaña, Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.PDF icon wifs12_distinguishability.pdf (265.05 KB)
L. Pérez-Freire, Comesaña, P., and Pérez-González, F., Detection in quantization-based watermarking: performance and security issues, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_secur.pdf (401.96 KB)
D. Vázquez-Padín, Fontani, M., Bianchi, T., Comesaña, P., Piva, A., and Barni, M., Detection of video double encoding with GOP size estimation, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156.PDF icon wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
B. Mathon, Bas, P., Cayre, F., and Pérez-González, F., Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding, in International Workshop on Information Hiding (IH), Santa Barbara, CA, U.S.A., 2008.
P. Comesaña and Pérez-González, F., Dither modulation in the logarithmic domain, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.PDF icon iwdw07.pdf (183.38 KB)
F. Pérez-González, Comesaña, P., and Balado, F., Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks., in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.PDF icon icip03a.pdf (145.04 KB)
M. Álvarez-Díaz, Scalise, S., Sciascia, G., Mura, R., Conforto, P., and Ernst, H., DVB-S Air Interface over Railroad Satellite Channel: Performance and Extensions, in Baiona Workshop on Signal Processing in Communications, Baiona, Spain, 2003.
T. Furon, Pérez-Freire, L., Guyader, A., and Cérou, F., Estimating the minimal length of Tardos code, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
M. Caus, Pastore, A., Navarro, M., Ramírez, T., Mosquera, C., Noels, N., Alagha, N., and Perez-Neira, A. I., Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems, in 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 2018.PDF icon exploratory-analysis-superposition.pdf (288.42 KB)
R. Elasmi-Ksibi, López-Valcarce, R., Besbes, H., Cherif, S., and Jaidane, M., A family of frequency estimators using higher-order sample covariance lags for real sinusoid detection, in European Signal Processing Conference (EUSIPCO), Lausanne, Switzerland, 2008.
F. Pérez-González, Masciopinto, M., González-Iglesias, I., and Comesaña, P., Fast Sequential Forensic Detection of Camera Fingerprint, in IEEE International Conference on Image Processing (ICIP), 2016.PDF icon perez.pdf (325.29 KB)