Primary tabs
“Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint”, IEEE Transactions on Information Forensics and Security, In Press.
TIFS19_GVPF.pdf (1.01 MB)
, 
“Dynamic Attribute-Based Privacy-Preserving Genomic Susceptibility Testing”, in 34th Annual ACM Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, 2019.
SAC19Final.pdf (745.27 KB)
, 
“Efficient PRNU Matching in the Encrypted Domain”, in XoveTIC, A Coruña, Spain, 2019.
PMTP19_XoveTIC19.pdf (517.32 KB)
, 
“Improving PRNU Compression Through Preprocessing, Quantization, and Coding”, IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, p. 13, 2019.
2018_prnu_resize_deadzone.pdf (3.81 MB)
, 
“Prediction Residue Analysis in MPEG-2 Double Compressed Video Sequences”, in EUSIPCO, A Coruña, Spain, 2019, pp. 1109-1113.
eusipco19_dvazquez_fperez.pdf (392.31 KB)
, 
“Rethinking Location Privacy for Unknown Mobility Behaviors”, in IEEE European Symposium on Security and Privacy (EuroS&P), 2019.
ms.pdf (634.43 KB)
, 
“Revisiting Multivariate Lattices for Encrypted Signal Processing”, in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019.
PTP19_IHMMSec19.pdf (1.67 MB)
, 
“Technical Report: MPEG-2 Prediction Residue Analysis”, University of Vigo, 2019.
TR19.pdf (501.11 KB)
, 
“Camera Attribution Forensic Analyzer in the Encrypted Domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018.
PMTP18_WIFS18.pdf (655.48 KB)
, 
“Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals”, in European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018.
Eusipco18_Masciopinto_PerezGonzalez.pdf (600.61 KB)
, 
“Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms”, in ACM Conference on Computer and Communications Security (CCS), 2017.
CCSmain.pdf (1.82 MB)
, 
“Design of projection matrices for PRNU compression”, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.
2017_prnu_projection.pdf (689.14 KB)
, 
“Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
ICASSPmain.pdf (382.42 KB)
, 
“Is Geo-Indistinguishability what you are looking for?”, in Workshop on Privacy in the Electronic Society (WPES), 2017.
1709.06318.pdf (822.66 KB)
, 
“Number Theoretic Transforms for Secure Signal Processing”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1125-1140, 2017.
PTP17_TIFS.pdf (651.54 KB)
, 
“A Random Matrix Approach to the Forensic Analysis of Upscaled Images”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115-2130, 2017.
TIFS17_resampling.pdf (1.04 MB)
, 
“Random Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling”, in International Tyrrhenian Workshop on Digital Communication 2017, Palermo, Italy, 2017, pp. 109-124.
TIWDC17_dvazquez_fperez_pcomesan.pdf (394.61 KB)
, 
“Secure Genomic Susceptibility Testing based on Lattice Encryption”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017.
TPP17_ICASSP17.pdf (403.53 KB)
, 
“Smart Detection of Line-Search Oracle Attacks”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 588-603, 2017.
TIFS_smartOracle.pdf (3.73 MB)
, 
“Statistical detection of JPEG traces in digital images in uncompressed formats”, IEEE Transactions on Information Forensics and Security, vol. 12, no. Pending, 2017.
TIFSbenford.pdf (5.94 MB)
, 
,
“Data Hiding Robust to Mobile Communication Vocoders”, IEEE Transactions on Multimedia, vol. 18, no. 12, pp. 2345-2357, 2016.
TMM2599149.pdf (3.04 MB)
, 
“Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016.
TNET2547391_author_version.pdf (1.96 MB)
, 
“Dynamic Privacy-Preserving Genomic Susceptibility Testing”, in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50.
IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, 
“Fast Sequential Forensic Detection of Camera Fingerprint”, in IEEE International Conference on Image Processing (ICIP), 2016.
perez.pdf (325.29 KB)
, 