Conference Paper
D. Vázquez-Padín and Pérez-González, F., Prefilter Design for Forensic Resampling Estimation, in IEEE International Workshop on Information Forensics and Security (WIFS), Foz do Iguaçu, Brazil, 2011, pp. 1-6.PDF icon wifs2011_dvazquez_fperez.pdf (301.04 KB)
Journal Article
J. R. Troncoso-Pastoriza and Pérez-González, F., Secure Adaptive Filtering, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011.PDF icon TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
Conference Paper
P. Comesaña and Pérez-González, F., Weber's law-based side-informed data hiding, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.PDF icon comesanaicassp11.pdf (119.42 KB)
P. Comesaña, Pérez-González, F., and Abdallah, C. T., Witsenhausen's counterexample and its links with multimedia security problems, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.PDF icon iwdw11_witsenhausen.pdf (152.97 KB)
J. R. Troncoso-Pastoriza and Pérez-González, F., CryptoDSPs for Cloud Privacy, in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
Conference Paper
B. Shebaro, Pérez-González, F., and Crandall, J. R., Leaving Timing Channel Fingerprints in Hidden Service Log Files, in Digital Forensic Research Workshop Annual Conference (DFRWS), Portland, Oregon, 2010.
J. R. Troncoso-Pastoriza, González-Jiménez, D., and Pérez-González, F., A new model for Gabor Coefficients' Magnitude in Face Recognition, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, USA, 2010.
N. Dalgaard, Mosquera, C., and Pérez-González, F., On the Role of Differentiation for Resampling Detection, in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010.
J. R. Troncoso-Pastoriza and Pérez-González, F., Secure and Private Medical Clouds using Encrypted Processing, in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
D. Vázquez-Padín, Mosquera, C., and Pérez-González, F., Two-dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images, in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010, pp. 1745-1748.PDF icon icip2010_dvazquez_cmosquera_fperez.pdf (1.32 MB)
M. Scagliola, Pérez-González, F., and Guccione, P., AN EXTENDED ANALYSIS OF DISCRETE FOURIER TRANFORM - RATIONAL DITHER MODULATION FOR NON-WHITE HOSTS, in IEEE International Workshop on Information Forensics and Security (WIFS), London, U.K., 2009.
Conference Paper
G. Domínguez-Conde, Comesaña, P., and Pérez-González, F., Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.PDF icon icip09domcomper.pdf (129.76 KB)
J. R. Troncoso-Pastoriza, Comesaña, P., and Pérez-González, F., Secure Direct and Iterative Protocols for Solving Systems of Linear Equations, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.PDF icon secure_sle_speedws09.pdf (193.97 KB)
J. R. Troncoso-Pastoriza and Pérez-González, F., Skewed Log-Stable model for natural images pixel block-variance, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
Journal Article
L. Pérez-Freire and Pérez-González, F., Spread spectrum watermarking security, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
Journal Article
F. Pérez-González and Mosquera, C., Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., and Pun, T., Quantization-Based Methods: Additive Attacks Performance Analysis, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
L. Pérez-Freire and Pérez-González, F., Security of lattice-based data hiding against the Watermarked Only Attack, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.