Year of Publication: 2006
“Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation”, International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006. ,
“Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006.
survey06security.pdf (268.87 KB) ,

“Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.
tifs06security.pdf (563.51 KB) ,

“An accurate analysis of scalar quantization-based data-hiding”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006. ,
“Improving the performance of RDM watermarking by means of trellis coded quantisation”, IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006. ,
“Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, Signal Processing, vol. 86, pp. 1076-1088, 2006. ,
Year of Publication: 2005
“Realizable minimum mean-squared error channel shorteners”, IEEE Transactions on Signal Processing, vol. 53, pp. 4354–4362, 2005.
T_SP_02192_2004.pdf (149.65 KB) ,

“Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005. ,
Year of Publication: 2004
“Estimation of road vehicle speed using two omnidirectional microphones: a maximum likelihood approach”, EURASIP Journal of Applied Signal Processing, vol. 2004, pp. 1059–1077, 2004.
regular.406.pdf (736.38 KB) ,

“Cost minimisation interpretation of fourth power phase estimator and links to multimodulus algorithm”, IEE Electronics Letters, vol. 40, pp. 278–279, 2004.
fourthpower.pdf (52.6 KB) ,
