Year of Publication: 2006
«Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB) ,
«The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006. ieee-spl06_cropping.ps (243.75 KB) ,
«Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation», International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006. ,
«Watermarking security: a survey», Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB) ,
«An accurate analysis of scalar quantization-based data-hiding», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006. ,
«Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB) ,
Year of Publication: 2005
«Realizable minimum mean-squared error channel shorteners», IEEE Transactions on Signal Processing, vol. 53, pp. 4354–4362, 2005. T_SP_02192_2004.pdf (149.65 KB) ,
«Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks», IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005. ,
Year of Publication: 2004
«Blind input, initial state, and system identification of SIMO Laguerre systems», IEEE Transactions on Signal Processing, vol. 52, pp. 3357–3369, 2004. ,
«Realizable linear and decision feedback equalizers: properties and connections», IEEE Transactions on Signal Processing, vol. 52, pp. 757–773, 2004. ,