Conference Paper
P. Comesaña, Pérez-González, F., and Abdallah, C. T., Witsenhausen's counterexample and its links with multimedia security problems, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.PDF icon iwdw11_witsenhausen.pdf (152.97 KB)
Journal Article
P. Comesaña, Merhav, N., and Barni, M., Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.PDF icon tit-2010.pdf (240.81 KB)
Conference Paper
G. Domínguez-Conde, Comesaña, P., and Pérez-González, F., Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.PDF icon icip09domcomper.pdf (129.76 KB)
Conference Paper
J. R. Troncoso-Pastoriza, Comesaña, P., and Pérez-González, F., Secure Direct and Iterative Protocols for Solving Systems of Linear Equations, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.PDF icon secure_sle_speedws09.pdf (193.97 KB)
J. R. Troncoso-Pastoriza, Comesaña, P., Pérez-Freire, L., and Pérez-González, F., Videosurveillance and privacy: covering the two sides of the mirror with DRM, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.PDF icon drm18-troncoso.pdf (417.17 KB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.PDF icon spie08one-bit-wm.pdf (277.85 KB)
Conference Paper
P. Comesaña and Pérez-González, F., On the capacity of stegosystems, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.PDF icon acm07stego.pdf (198.41 KB)
P. Comesaña and Pérez-González, F., Dither modulation in the logarithmic domain, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.PDF icon iwdw07.pdf (183.38 KB)
D. González-Jiménez, Pérez-González, F., Comesaña, P., Pérez-Freire, L., and Alba-Castro, J. L., Modeling Gabor coefficients via Generalized Gaussian Distributions for face recognition, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.PDF icon gonzalezjimenez_camera_ready.pdf (339.33 KB)
P. Comesaña, Balado, F., and Pérez-González, F., A Novel Interpretation of Content Authentication, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07authentication.pdf (179.34 KB)
M. Barni, Pérez-González, F., Comesaña, P., and Bartoli, G., Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.PDF icon icassp07reproducible.pdf (67.03 KB)
P. Comesaña and Pérez-González, F., Two different approaches for attacking BOWS, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07bows.pdf (416.45 KB)
P. Comesaña and Pérez-González, F., On a watermarking scheme in the logarithmic domain and its perceptual advantages, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.PDF icon icip07logwat.pdf (77.03 KB)
Journal Article
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.File iee-06bnsa.ps (1.67 MB)
Conference Paper
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The blind Newton senstivity attack, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.File spie06_sensitivity.ps (1.62 MB)
Conference Paper
L. Pérez-Freire, Pérez-González, F., and Comesaña, P., Secret dither estimation in lattice-quantization data hiding: a set-membership approach, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.PDF icon spie06_sme.pdf (223.01 KB)
Journal Article
L. Pérez-Freire, Pérez-González, F., Furon, T., and Comesaña, P., Security of lattice-based data hiding against the Known Message Attack, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.PDF icon tifs06security.pdf (563.51 KB)
Journal Article
L. Pérez-Freire, Comesaña, P., Troncoso-Pastoriza, J. R., and Pérez-González, F., Watermarking security: a survey, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006.PDF icon survey06security.pdf (268.87 KB)
Conference Paper
P. Comesaña, Pérez-González, F., and Willems, F. M. J., Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_dpc.pdf (165.56 KB)
L. Pérez-Freire, Comesaña, P., and Pérez-González, F., Detection in quantization-based watermarking: performance and security issues, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_secur.pdf (401.96 KB)