2009
L. Pérez-Freire and Furon, T., Blind decoder for binary probabilistic traitor tracing codes, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
T. Furon and Pérez-Freire, L., EM decoding of Tardos traitor tracing codes, in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
T. Furon, Pérez-Freire, L., Guyader, A., and Cérou, F., Estimating the minimal length of Tardos code, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
L. Pérez-Freire and Pérez-González, F., Spread spectrum watermarking security, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
J. R. Troncoso-Pastoriza, Comesaña, P., Pérez-Freire, L., and Pérez-González, F., Videosurveillance and privacy: covering the two sides of the mirror with DRM, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.PDF icon drm18-troncoso.pdf (417.17 KB)
T. Furon and Pérez-Freire, L., Worst case attacks against binary probabilistic traitor tracing codes, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
2006
L. Pérez-Freire, Pérez-González, F., and Voloshynovskiy, S., An accurate analysis of scalar quantization-based data-hiding, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
L. Pérez-Freire, Pérez-González, F., and Furon, T., On achievable security levels for lattice data hiding in the Known Message Attack scenario, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.File iee-06bnsa.ps (1.67 MB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The blind Newton senstivity attack, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.File spie06_sensitivity.ps (1.62 MB)
L. Pérez-Freire, Pérez-González, F., and Comesaña, P., Secret dither estimation in lattice-quantization data hiding: a set-membership approach, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.PDF icon spie06_sme.pdf (223.01 KB)
L. Pérez-Freire, Pérez-González, F., Furon, T., and Comesaña, P., Security of lattice-based data hiding against the Known Message Attack, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.PDF icon tifs06security.pdf (563.51 KB)
L. Pérez-Freire, Comesaña, P., Troncoso-Pastoriza, J. R., and Pérez-González, F., Watermarking security: a survey, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006.PDF icon survey06security.pdf (268.87 KB)
2005
L. Pérez-Freire, Comesaña, P., and Pérez-González, F., Detection in quantization-based watermarking: performance and security issues, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_secur.pdf (401.96 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Fundamentals of data hiding security and their application to spread-spectrum analysis, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.PDF icon ih05_fundamentals.pdf (222.99 KB)
L. Pérez-Freire, Comesaña, P., and Pérez-González, F., Information-theoretic analysis of security in side-informed data hiding, in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145.PDF icon ih05_sideinformed.pdf (218.44 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.PDF icon wiamis05.pdf (119.47 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The return of the sensitivity attack, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.PDF icon iwdw05.pdf (190.47 KB)