Primary tabs
“Improving the performance of RDM watermarking by means of trellis coded quantisation”, IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006.
, “A novel model for the print-and-capture channel in 2D bar codes”, in International Workshop on Multimedia Content Representation, Classification and Security, Istambul, Turkey, 2006, vol. 4105, pp. 627-634.
, “Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, Signal Processing, vol. 86, pp. 1076-1088, 2006.
, “Secret dither estimation in lattice-quantization data hiding: a set-membership approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sme.pdf (223.01 KB)
, 
“Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.
tifs06security.pdf (563.51 KB)
, 
“Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006.
survey06security.pdf (268.87 KB)
, 
“Zero-Knowledge watermark detector robust to sensitivity attacks”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
, “Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
“Detection in quantization-based watermarking: performance and security issues”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_secur.pdf (401.96 KB)
, 
“Ensuring Gain Invariance in High-Rate Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Fundamentals of data hiding security and their application to spread-spectrum analysis”, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.
ih05_fundamentals.pdf (222.99 KB)
, 
“Fundamentals of data hiding security and their application to spread-spectrum analysis”, in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.
ih05_fundamentals.pdf (222.99 KB)
, 
“Information-theoretic analysis of security in side-informed data hiding”, in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145.
ih05_sideinformed.pdf (218.44 KB)
, 
“Information-theoretic analysis of security in side-informed data hiding”, in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145.
ih05_sideinformed.pdf (218.44 KB)
, 
“An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.
wiamis05.pdf (119.47 KB)
, 
“Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.
iwdw05.pdf (190.47 KB)
, 
“Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Spread-spectrum vs. quantization-based data hiding: misconceptions and implications”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Worst case additive attack against quantization-based data-hiding methods”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Bias analysis and removal of a microphone array based road traffic speed estimator”, in European Signal Processing Conference (EUSIPCO), Vienna, Austria, 2004.
biasanalysis.pdf (106.81 KB)
, 
“Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.
spie04em.pdf (434.03 KB)
, 
“Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, “Estimation of road vehicle speed using two omnidirectional microphones: a maximum likelihood approach”, EURASIP Journal of Applied Signal Processing, vol. 2004, pp. 1059–1077, 2004.
regular.406.pdf (736.38 KB)
, 
“Improved Binary Dither-Modulation with perceptual constraints”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, Portugal, 2004.
wiamis04_dm.ps (268.36 KB)
, 