Primary tabs
“Benford's Law in Image Processing”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007.
, “Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks”, EURASIP Journal on Information Security, vol. 2007, 2007.
jis07bows.pdf (436.69 KB)
Source code available here. (8.51 MB)
, 

“On the capacity of stegosystems”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.
acm07stego.pdf (198.41 KB)
, 
Comunicaciones Digitales. Pearson - Prentice Hall, 2007.
, “Disclosing secrets in watermarking and data hiding”, in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
, “On Distortion Measures Associated to Random Desynchronization Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Dither modulation in the logarithmic domain”, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.
iwdw07.pdf (183.38 KB)
, 
“Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks”, EURASIP Journal on Information Security, 2007.
, “Exploiting security holes in lattice data hiding”, in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.
, “A Generalization of Benford's Law and Its Application to Images”, in European Control Conference (ECC), Kos, Greece, 2007.
, “Modeling Gabor coefficients via Generalized Gaussian Distributions for face recognition”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
gonzalezjimenez_camera_ready.pdf (339.33 KB)
, 
“A Novel Interpretation of Content Authentication”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07authentication.pdf (179.34 KB)
, 
“Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.
icassp07reproducible.pdf (67.03 KB)
, 
“Security of Spread-Spectrum-Based Data Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
, “Two different approaches for attacking BOWS”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07bows.pdf (416.45 KB)
, 
“On a watermarking scheme in the logarithmic domain and its perceptual advantages”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
icip07logwat.pdf (77.03 KB)
, 
“An accurate analysis of scalar quantization-based data-hiding”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, “On achievable security levels for lattice data hiding in the Known Message Attack scenario”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, “Blind Newton Sensitivity Attack”, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.
iee-06bnsa.ps (1.67 MB)
, 
“The blind Newton senstivity attack”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sensitivity.ps (1.62 MB)
, 
“On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.
dcdm_uvigo05.pdf (311.95 KB)
, 
“High-rate quantization data hiding robust to arbitrary linear filtering attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, “The impact of the cropping attack on scalar STDM data hiding”, IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.
ieee-spl06_cropping.ps (243.75 KB)
, 