Year of Publication: 2008
«Security of lattice-based data hiding against the Watermarked Only Attack», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008. ,
«Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008. ,
«Non-Data-Aided Symbol Rate Estimation of Linearly Modulated Signals», IEEE Transactions on Signal Processing, 2008. ,
«Quantization-Based Methods: Additive Attacks Performance Analysis», Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008. ,
Year of Publication: 2007
«Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation», IEEE Communications Letters, vol. 11, pp. 351-353, 2007.
lopezvalcarce_CL2006-1948.pdf (195.93 KB) ,

«Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks», EURASIP Journal on Information Security, 2007. ,
«Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007.
jis07bows.pdf (436.69 KB)
Source code available here. (8.51 MB) ,


Year of Publication: 2006
«The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.
ieee-spl06_cropping.ps (243.75 KB) ,

«On distortion-compensated Dither Modulation data-hiding with repetition coding», IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.
dcdm_uvigo05.pdf (311.95 KB) ,

«Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.
iee-06bnsa.ps (1.67 MB) ,
