Export 18 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
Conference Paper
L. Pérez-Freire, Pérez-González, F., and Furon, T., On achievable security levels for lattice data hiding in the Known Message Attack scenario, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
M. Richharia, Kaluvala, N., Fines, P., Álvarez-Díaz, M., and Jahn, A., Aeronautical Channel Model for Broadband L-Band Satellite Communication, in AIAA International Communications Satellite Systems Conference (ICSSC), Rome, Italy, 2005.
L. Pérez-Freire and Furon, T., Blind decoder for binary probabilistic traitor tracing codes, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
D. Vázquez-Padín, Fontani, M., Bianchi, T., Comesaña, P., Piva, A., and Barni, M., Detection of video double encoding with GOP size estimation, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156.PDF icon wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
T. Furon and Pérez-Freire, L., EM decoding of Tardos traitor tracing codes, in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
D. A. Rodríguez-Silva, González-Castaño, J. F., Adkinson-Orellana, L., Fernández-Cordeiro, A., Troncoso-Pastoriza, J. R., and González-Martínez, D., Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience, in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
T. Furon, Pérez-Freire, L., Guyader, A., and Cérou, F., Estimating the minimal length of Tardos code, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
D. Fondo, Cacheda, M., and Mosquera, C., Indoor Image Acquisition and Distribution System, in International Symposium on Power Line Communications and Its Applications (ISPLC), 2003.
D. Labartino, Bianchi, T., De Rosa, A., Fontani, M., Vázquez-Padín, D., Piva, A., and Barni, M., Localization of Forgeries in MPEG-2 Video through GOP Size and DQ analysis, in IEEE International Workshop on Multimedia Signal Processing (MMSP), Pula (Sardinia), Italy, 2013, pp. 494-499.PDF icon mmsp13_dlabartino_tbianchi_aderosa_mfontani_dvazquez_apiva_mbarni.pdf (901.49 KB)
M. Ferreiro, Cacheda, M., and Mosquera, C., A low complexity all-digital DS-SS transceiver for power-line communications, in International Symposium on Power Line Communications and Its Applications (ISPLC), 2003.
R. López-Valcarce, Dasgupta, S., Fu, M., and Tempo, R., Stability conditions for the time-varying linear predictor, in IEEE Conference on Decision and Control (CDC), Tampa, FL, USA, 1998, pp. 1840–1845.
G. Boato, Fontanari, C., Natale, D. F. G. B., and Pérez-González, F., Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
T. Furon and Pérez-Freire, L., Worst case attacks against binary probabilistic traitor tracing codes, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.