%0 Conference Paper %B 2023 IEEE International Workshop on Information Forensics and Security (WIFS) %D 2023 %T Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-Based Codes %A Elena Rodríguez-Lois %A Fernando Pérez-González %K Artificial neural networks %K black-box %K Closed box %K Codes %K Data security %K DNN watermarking %K Fingerprinting %K forensics %K Tardos codes %K Training %K Traitor tracing %K watermarking %K white-box %B 2023 IEEE International Workshop on Information Forensics and Security (WIFS) %P 1-6 %G eng %U https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10374879 %R 10.1109/WIFS58808.2023.10374879 %0 Conference Paper %B Media Watermarking, Security, and Forensics %D 2014 %T Are you threatening me? Towards smart detectors in watermarking %A Mauro Barni %A Pedro Comesaña %A Fernando Pérez-González %A Benedetta Tondi %K adversarial signal processing %K watermarking %B Media Watermarking, Security, and Forensics %I SPIE %C San Francisco, CA, USA %8 02/2014 %G eng %R 10.1117/12.2036415 %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2012 %T Fully Homomorphic Faces %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K face verification %K homomorphic processing %K lattice cryptography %K privacy %K watermarking %B IEEE International Conference on Image Processing (ICIP) %I IEEE %C Lake Buena Vista, Florida, USA %8 10/2012 %G eng %0 Conference Paper %B IEEE International Conference on Communications (ICC) %D 2011 %T A Dirty Paper Scheme for Hierarchical OFDM %A Scagliola, Michele %A Fernando Pérez-González %A Guccione, Pietro %K dirty paper %K Hierarchical OFDM %K watermarking %B IEEE International Conference on Communications (ICC) %C Kioto, Japan %8 June %G eng %0 Conference Paper %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %D 2011 %T Efficient Protocols for Secure Adaptive Filtering %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K adaptive filtering %K privacy %K security %K watermarking %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %I IEEE %C Prage, Czech Republic %P 5860-5863 %8 May %G eng %0 Conference Paper %B International Conference on Cloud Computing and Services Science (CLOSER) %D 2011 %T Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience %A Daniel A. Rodríguez-Silva %A F. Javier González-Castaño %A Lilian Adkinson-Orellana %A Alexandre Fernández-Cordeiro %A Juan Ramón Troncoso-Pastoriza %A Daniel González-Martínez %K cloud %K privacy %K security %K watermarking %B International Conference on Cloud Computing and Services Science (CLOSER) %C Noordwijkerhout, The Netherlands %8 May %G eng %0 Journal Article %J IEEE Transactions on Communications %D 2011 %T Gain-Invariant Dirty Paper Coding for Hierarchical OFDM %A Scagliola, Michele %A Fernando Pérez-González %A Guccione, Pietro %K dirty paper %K dynacs %K Hierarchical OFDM %K watermarking %X

A novel approach is here presented to superimpose a low-priority data stream on a high-priority data stream for OFDM systems. The main improvement with respect to conventional hierarchical modulation, which is included with the same purpose in various wireless technologies, is that the low-priority data stream can be decoded from the received subcarrier symbols without any previous equalization for multipath fading channels. As a consequence, the expected performance is nearly invariant of the channel estimation method used to equalize the channel. The low-priority stream is inserted adopting a gain-invariant dirty paper coding based on Rational Dither Modulation, which was proposed for data hiding applications. In this paper an analysis of the developed system is presented and several simulations have been carried out using DVB-T system parameters to verify the validity of the proposed approach. The experimental results show the better performance of the proposed method with respect to that of a conventional hierarchical modulation, particularly when the accuracy of the estimated channel response decreases.

%B IEEE Transactions on Communications %V 59 %P 3323-3334 %8 December %G eng %R 10.1109/TCOMM.2011.101011.100544 %0 Conference Paper %B IEEE International Conference on Multimedia and Expo (ICME) %D 2011 %T Improving the Visual Performance of S/DISCUS %A Gabriel Domínguez-Conde %A Deepa Kundur %K distributed source coding %K keyless security %K low-complexity video coding %K Slepian-Wolf coding %K watermarking %K wireless multimedia sensor networks %B IEEE International Conference on Multimedia and Expo (ICME) %C Barcelona, Catalonia %8 July %G eng %0 Conference Paper %B Document Recognition and Retrieval %D 2011 %T A new method for perspective correction of document images %A José Rodríguez-Piñeiro %A Pedro Comesaña %A Fernando Pérez-González %A Alberto Malvido %K Document image %K perspective distortion correction %K watermarking %B Document Recognition and Retrieval %S Proc. of SPIE %I SPIE %C San Francisco, CA %V 7874 %P 787410 %8 January %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2011 %T Secure Adaptive Filtering %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K adaptive signal processing %K computational complexity %K cryptography %K digital data protection %K encrypted domain %K homomorphic encryption systems %K least mean squares algorithm %K least mean squares methods %K privacy %K secure adaptive filtering %K security %K signal privacy preservation %K SPED techniques %K watermarking %B IEEE Transactions on Information Forensics and Security %V 6 %P 469 -485 %8 June %G eng %R 10.1109/TIFS.2011.2109385 %0 Conference Paper %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %D 2011 %T Weber's law-based side-informed data hiding %A Pedro Comesaña %A Fernando Pérez-González %K data hiding %K Logarithmic watermarking %K Perceptually shaped watermarks %K watermarking %K Weber's law %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %C Prague, Czech Republic %P 1840-1843 %8 May %G eng %0 Journal Article %J IEEE Transactions on Information Theory %D 2010 %T Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime %A Pedro Comesaña %A Neri Merhav %A Mauro Barni %K hypothesis testing %K Neyman-Pearson %K watermark detection %K watermark embedding %K watermarking %B IEEE Transactions on Information Theory %V 56 %P 2804-2815 %8 June %G eng %0 Conference Paper %B International Workshop on Cloud Information System Engineering (CISE) %D 2010 %T CryptoDSPs for Cloud Privacy %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K cloud %K privacy %K security %K watermarking %B International Workshop on Cloud Information System Engineering (CISE) %S LNCS %C Hong Kong, China %V 6724 %8 December %G eng %0 Journal Article %J Digital Investigation %D 2010 %T Leaving Timing Channel Fingerprints in Hidden Service Log Files %A Bilal Shebaro %A Fernando Pérez-González %A Jedidiah R. Crandall %K data-hiding %K fingerprints %K hidden services %K timestamps %K timing channel %K tor network %K watermarking %B Digital Investigation %G eng %0 Conference Paper %B Digital Forensic Research Workshop Annual Conference (DFRWS) %D 2010 %T Leaving Timing Channel Fingerprints in Hidden Service Log Files %A Bilal Shebaro %A Fernando Pérez-González %A Jedidiah R. Crandall %K data hiding %K fingerprints %K hidden services %K timestamps %K timing channel %K tor network %K watermarking %B Digital Forensic Research Workshop Annual Conference (DFRWS) %C Portland, Oregon %8 August %G eng %0 Conference Paper %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %D 2010 %T A new model for Gabor Coefficients' Magnitude in Face Recognition %A Juan Ramón Troncoso-Pastoriza %A Daniel González-Jiménez %A Fernando Pérez-González %K Gabor coefficients %K generalized Gaussian %K Magnitude %K Quantization %K Statistical Model %K watermarking %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %I IEEE %C Dallas, USA %8 March %G eng %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2010 %T On the Role of Differentiation for Resampling Detection %A Nahuel Dalgaard %A C. Mosquera %A Fernando Pérez-González %K cyclostationarity %K Image forensics %K interpolation %K prefiltering %K resampling detection %K watermarking %B IEEE International Conference on Image Processing (ICIP) %I IEEE %C Hong Kong, China %8 September %G eng %0 Conference Paper %B Virtual Physiological Human (VPH) %D 2010 %T Secure and Private Medical Clouds using Encrypted Processing %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K cloud %K privacy %K security %K watermarking %B Virtual Physiological Human (VPH) %C Brussels, Belgium %8 October %G eng %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2010 %T Two-dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images %A David Vázquez-Padín %A C. Mosquera %A Fernando Pérez-González %K cyclostationarity %K Image forensics %K interpolation %K resampling factor estimation %K spatial transformation %K watermarking %X

In this work, we study the presence of almost cyclostationary fields in images for the detection and estimation of digital forgeries. The almost periodically correlated fields in the two-dimensional space are introduced by the necessary interpolation operation associated with the applied spatial transformation. In this theoretical context, we extend a statistical time-domain test for presence of cyclostationarity to the two-dimensional space. The proposed method allows us to estimate the scaling factor and the rotation angle of resized and rotated images, respectively. Examples of the output of our method are shown and comparative results are presented to evaluate the performance of the two-dimensional extension.

%B IEEE International Conference on Image Processing (ICIP) %I IEEE %C Hong Kong, China %P 1745-1748 %8 09/2010 %G eng %R 10.1109/ICIP.2010.5652513 %0 Conference Paper %B IEEE International Workshop on Information Forensics and Security (WIFS) %D 2009 %T Blind decoder for binary probabilistic traitor tracing codes %A Luis Pérez-Freire %A Teddy Furon %K collusion %K information theory %K Tardos %K Traitor tracing %K watermarking %B IEEE International Workshop on Information Forensics and Security (WIFS) %C London, UK %P 56-60 %8 6-9 December %G eng %0 Conference Paper %B ACM Workshop on Multimedia and Security (MMSEC) %D 2009 %T EM decoding of Tardos traitor tracing codes %A Teddy Furon %A Luis Pérez-Freire %K collusion channel %K Expectation-Maximization %K iterative decoding %K Tardos code %K Traitor tracing %K watermarking %B ACM Workshop on Multimedia and Security (MMSEC) %C Princeton, NJ, USA %8 7-8 September %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 2009 %T Estimating the minimal length of Tardos code %A Teddy Furon %A Luis Pérez-Freire %A Arnaud Guyader %A Frédéric Cérou %K Fingerprinting %K Rare event %K Tardos code %K Traitor tracing %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %C Darmstadt, Germany %8 7-10 June %G eng %0 Conference Paper %B IEEE International Workshop on Information Forensics and Security (WIFS) %D 2009 %T AN EXTENDED ANALYSIS OF DISCRETE FOURIER TRANFORM - RATIONAL DITHER MODULATION FOR NON-WHITE HOSTS %A Scagliola, Michele %A Fernando Pérez-González %A Guccione, Pietro %K data hiding %K dither modulation %K filtering %K non-white Gaussian hosts %K watermarking %B IEEE International Workshop on Information Forensics and Security (WIFS) %I IEEE %C London, U.K. %8 December %G eng %0 Journal Article %J EURASIP Journal on Information Security %D 2009 %T High-rate data-hiding robust to linear filtering for colored hosts %A Scagliola, Michele %A Fernando Pérez-González %A Guccione, Pietro %K data-hiding %K rational dither modulation %K watermarking %B EURASIP Journal on Information Security %G eng %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2009 %T Modeling Magnitudes of Gabor Coefficients: The β-Rayleigh Distribution %A Daniel González-Jiménez %A Enrique Argones-Rúa %A Fernando Pérez-González %A José Luis Alba-Castro %K Gabor %K generalized Gaussian %K Rayleigh %K watermarking %B IEEE International Conference on Image Processing (ICIP) %I IEEE %C Cairo, Egypt %8 November %G eng %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2009 %T Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method %A Gabriel Domínguez-Conde %A Pedro Comesaña %A Fernando Pérez-González %K cryptography %K error statistics %K false negative probabilities %K false positive probabilities %K Fridrich-Goljan self-embedding authentication method %K hash bit errors %K image authentication method %K image coding %K message authentication %K performance analysis %K robust hashing %K watermarking %B IEEE International Conference on Image Processing (ICIP) %C Cairo, Egypt %8 November %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2009 %T Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method %A Gabriel Domínguez-Conde %A Pedro Comesaña %A Fernando Pérez-González %K cryptography %K error statistics %K false negative probabilities %K false positive probabilities %K Fridrich-Goljan self-embedding authentication method %K hash bit errors %K image authentication method %K image coding %K message authentication %K performance analysis %K robust hashing %K watermarking %B IEEE Transactions on Information Forensics and Security %V 4 %P 570-577 %8 Sept. %G eng %0 Conference Paper %B Signal Processing in the Encrypted Domain (SPEED) Workshop %D 2009 %T Secure Direct and Iterative Protocols for Solving Systems of Linear Equations %A Juan Ramón Troncoso-Pastoriza %A Pedro Comesaña %A Fernando Pérez-González %K iterative protocol %K privacy %K security %K systems of linear equations %K watermarking %B Signal Processing in the Encrypted Domain (SPEED) Workshop %C Lausanne, Switzerland %P 122–141 %8 September %G eng %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2009 %T Skewed Log-Stable model for natural images pixel block-variance %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K Doubly stochastic model %K Image block-variance %K Log-stable distribution %K Lognormal distribution %K watermarking %B IEEE International Conference on Image Processing (ICIP) %I IEEE %C Cairo, Egypt %8 November %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2009 %T Spread spectrum watermarking security %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B IEEE Transactions on Information Forensics and Security %V 4 %P 2-24 %8 March %G eng %0 Conference Paper %B ACM Workshop on Digital Rights Management (DRM) %D 2009 %T Videosurveillance and privacy: covering the two sides of the mirror with DRM %A Juan Ramón Troncoso-Pastoriza %A Pedro Comesaña %A Luis Pérez-Freire %A Fernando Pérez-González %K access control %K privacy %K rights management %K security %K videosurveillance %K watermarking %B ACM Workshop on Digital Rights Management (DRM) %I ACM %C Chicago, IL, USA %8 November %G eng %0 Conference Paper %B IEEE International Workshop on Information Forensics and Security (WIFS) %D 2009 %T Worst case attacks against binary probabilistic traitor tracing codes %A Teddy Furon %A Luis Pérez-Freire %K collusion %K information theory %K Tardos %K Traitor tracing %K watermarking %B IEEE International Workshop on Information Forensics and Security (WIFS) %C London, UK %P 46-50 %8 6-9 December %G eng %0 Thesis %D 2008 %T Digital Watermarking Security %A Luis Pérez-Freire %K data-hiding %K security %K watermarking %I University of Vigo, Spain %G eng %9 phd %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2008 %T Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering %A Fernando Pérez-González %A C. Mosquera %K data-hiding %K watermarking %B IEEE Transactions on Information Forensics and Security %V 3 %P 137-152 %8 June %G eng %0 Journal Article %J Transactions on Data Hiding and Multimedia Security III %D 2008 %T Quantization-Based Methods: Additive Attacks Performance Analysis %A Jose Emilio Vila-Forcén %A Sviatoslav Voloshynovskiy %A Oleksiy Koval %A Fernando Pérez-González %A Thierry Pun %K data-hiding %K watermarking %B Transactions on Data Hiding and Multimedia Security III %V 4920 %P 70-90 %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2008 %T Security of lattice-based data hiding against the Watermarked Only Attack %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B IEEE Transactions on Information Forensics and Security %V 3 %P 593-610 %8 December %G eng %0 Journal Article %J EURASIP Journal on Information Security %D 2007 %T Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks %A Pedro Comesaña %A Fernando Pérez-González %K data-hiding %K oracle %K sensitivity %K watermarking %B EURASIP Journal on Information Security %V 2007 %8 February %G eng %0 Conference Paper %B ACM Workshop on Multimedia and Security (MMSEC) %D 2007 %T On the capacity of stegosystems %A Pedro Comesaña %A Fernando Pérez-González %K data-hiding %K steganography %K watermarking %B ACM Workshop on Multimedia and Security (MMSEC) %C Dallas, TX, USA %P 1261-1264 %8 September %G eng %0 Conference Paper %B Third Wavila Challenge (WaCha) %D 2007 %T Disclosing secrets in watermarking and data hiding %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B Third Wavila Challenge (WaCha) %S ECRYPT proceedings series from the Otto-von-Guericke University, Magdeburg, Germany %C Saint-Malo, France %8 14 June %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2007 %T On Distortion Measures Associated to Random Desynchronization Attacks %A Félix Balado %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K data-hiding %K desynchronization %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %8 January %G eng %0 Conference Paper %B International Workshop on Digital Watermarking (IWDW) %D 2007 %T Dither modulation in the logarithmic domain %A Pedro Comesaña %A Fernando Pérez-González %K data-hiding %K watermarking %B International Workshop on Digital Watermarking (IWDW) %C Guangzhou, China %P 1261-1264 %8 December %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2007 %T Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K data-hiding %K sensitivity %K watermarking %K zero-knowledge %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %8 January %G eng %0 Journal Article %J EURASIP Journal on Information Security %D 2007 %T Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K data-hiding %K sensitivity %K watermarking %K zero-knowledge %B EURASIP Journal on Information Security %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 2007 %T Exploiting security holes in lattice data hiding %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %C Saint-Malo, France %8 11-13 June %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2007 %T A Novel Interpretation of Content Authentication %A Pedro Comesaña %A Félix Balado %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K authentication %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %8 January %G eng %0 Generic %D 2007 %T Practical estimators of the secret spreading vector for Improved Spread Spectrum modulations. Statistical analysis and results %A Luis Pérez-Freire %K data-hiding %K security %K watermarking %I Signal Theory and Communications Department, University of Vigo, Spain %8 November %G eng %9 Internal report %0 Conference Paper %B ACM Conference on Computer and Communications Security (CCS) %D 2007 %T Privacy Preserving Error Resilient DNA Searching through Oblivious Automata %A Juan Ramón Troncoso-Pastoriza %A Stefan Katzenbeisser %A Mehmet Celik %K DNA %K privacy %K security %K watermarking %B ACM Conference on Computer and Communications Security (CCS) %I ACM Press %C Alexandria, Virginia, USA %P 519–528 %8 Oct 29–Nov 2 %G eng %0 Conference Paper %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %D 2007 %T Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking %A Mauro Barni %A Fernando Pérez-González %A Pedro Comesaña %A Guido Bartoli %K data-hiding %K watermarking %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %C Honolulu, HW, USA %V 4 %P 1261-1264 %8 April %G eng %0 Conference Paper %B ACM Workshop on Multimedia and Security (MMSEC) %D 2007 %T A Secure Multidimensional Point Inclusion Protocol %A Juan Ramón Troncoso-Pastoriza %A Stefan Katzenbeisser %A Mehmet Celik %A Aweke Lemma %K multiparty computation %K privacy %K security %K watermarking %B ACM Workshop on Multimedia and Security (MMSEC) %C Dallas, Texas, USA %P 109–120 %8 September %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2007 %T Security of Spread-Spectrum-Based Data Hiding %A Luis Pérez-Freire %A Pierre Moulin %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K data-hiding %K security %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %8 January %G eng %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2007 %T Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme %A G. Boato %A C. Fontanari %A F. G. B. De Natale %A Fernando Pérez-González %K watermarking %B IEEE International Conference on Image Processing (ICIP) %C San Antonio, TX, USA %P 1261-1264 %8 September %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2007 %T Two different approaches for attacking BOWS %A Pedro Comesaña %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K BOWS %K data-hiding %K sensitivity %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %8 January %G eng %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2007 %T On a watermarking scheme in the logarithmic domain and its perceptual advantages %A Pedro Comesaña %A Fernando Pérez-González %K data-hiding %K watermarking %B IEEE International Conference on Image Processing (ICIP) %C San Antonio, TX, USA %P 1261-1264 %8 September %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2006 %T An accurate analysis of scalar quantization-based data-hiding %A Luis Pérez-Freire %A Fernando Pérez-González %A Sviatoslav Voloshynovskiy %K data-hiding %K security %K watermarking %B IEEE Transactions on Information Forensics and Security %V 1 %P 80-86 %8 March %G eng %0 Conference Paper %B ACM Workshop on Multimedia and Security (MMSEC) %D 2006 %T On achievable security levels for lattice data hiding in the Known Message Attack scenario %A Luis Pérez-Freire %A Fernando Pérez-González %A Teddy Furon %K data-hiding %K security %K watermarking %B ACM Workshop on Multimedia and Security (MMSEC) %I ACM %C Geneva, Switzerland %P 68-79 %8 September %G eng %0 Journal Article %J IEE Proceedings on Information Security %D 2006 %T Blind Newton Sensitivity Attack %A Pedro Comesaña %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K watermarking %B IEE Proceedings on Information Security %V 153 %P 115-125 %8 September %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2006 %T The blind Newton senstivity attack %A Pedro Comesaña %A Luis Pérez-Freire %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Journal Article %J IEEE Transactions on Signal Processing %D 2006 %T On distortion-compensated Dither Modulation data-hiding with repetition coding %A Pedro Comesaña %A Fernando Pérez-González %A Félix Balado %K data-hiding %K watermarking %B IEEE Transactions on Signal Processing %V 54 %P 585-600 %8 February %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2006 %T High-rate quantization data hiding robust to arbitrary linear filtering attacks %A Fernando Pérez-González %A C. Mosquera %A Marcos Álvarez-Díaz %A Reginald Lagendijk %E Edward J. Delp %E Ping W. Wong %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Journal Article %J IEEE Signal Processing Letters %D 2006 %T The impact of the cropping attack on scalar STDM data hiding %A Pedro Comesaña %A Fernando Pérez-González %K data-hiding %K watermarking %B IEEE Signal Processing Letters %V 13 %P 353-356 %8 June %G eng %0 Journal Article %J IEE Proceedings on Information Security %D 2006 %T Improving the performance of RDM watermarking by means of trellis coded quantisation %A Andrea Abrardo %A Mauro Barni %A Fernando Pérez-González %A C. Mosquera %K data-hiding %K watermarking %B IEE Proceedings on Information Security %V 153 %P 107-114 %8 September %G eng %0 Journal Article %J Signal Processing %D 2006 %T Robustness Improvement of Known-Host-State Watermarking Using Host Statistics %A Oleksiy Koval %A Sviatoslav Voloshynovskiy %A Jose Emilio Vila-Forcén %A Fernando Pérez-González %A Frederic Deguillaume %A Thierry Pun %K data-hiding %K watermarking %B Signal Processing %V 86 %P 1076-1088 %8 May %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2006 %T Secret dither estimation in lattice-quantization data hiding: a set-membership approach %A Luis Pérez-Freire %A Fernando Pérez-González %A Pedro Comesaña %E Edward J. Delp %E Ping W. Wong %K data-hiding %K security %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Journal Article %J IEEE Transactions on Information Forensics and Security %D 2006 %T Security of lattice-based data hiding against the Known Message Attack %A Luis Pérez-Freire %A Fernando Pérez-González %A Teddy Furon %A Pedro Comesaña %K data-hiding %K security %K watermarking %B IEEE Transactions on Information Forensics and Security %V 1 %P 421-439 %8 December %G eng %0 Thesis %D 2006 %T Side-informed data hiding: robustness and security analysis %A Pedro Comesaña %K data-hiding %K watermarking %I University of Vigo, Spain %G eng %9 phd %0 Journal Article %J Transactions on Data Hiding and Multimedia Security I %D 2006 %T Watermarking security: a survey %A Luis Pérez-Freire %A Pedro Comesaña %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B Transactions on Data Hiding and Multimedia Security I %V 4300 %P 41-72 %8 October %G eng %0 Conference Paper %B ACM Workshop on Multimedia and Security (MMSEC) %D 2006 %T Zero-Knowledge watermark detector robust to sensitivity attacks %A Juan Ramón Troncoso-Pastoriza %A Fernando Pérez-González %K data-hiding %K watermarking %K zero-knowledge %B ACM Workshop on Multimedia and Security (MMSEC) %I ACM %C Geneva, Switzerland %P 97-107 %8 September %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2005 %T Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding %A Pedro Comesaña %A Fernando Pérez-González %A Frans M. J. Willems %E Edward J. Delp %E Ping W. Wong %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2005 %T Detection in quantization-based watermarking: performance and security issues %A Luis Pérez-Freire %A Pedro Comesaña %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K data-hiding %K security %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2005 %T Ensuring Gain Invariance in High-Rate Data-Hiding %A Fernando Pérez-González %A C. Mosquera %A Mauro Barni %A Andrea Abrardo %E Edward J. Delp %E Ping W. Wong %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 2005 %T Fundamentals of data hiding security and their application to spread-spectrum analysis %A Pedro Comesaña %A Luis Pérez-Freire %A Fernando Pérez-González %E Mauro Barni %E Jordi Herrera-Joancomartí %E Stefan Katzenbeisser %E Fernando Pérez-González %K data-hiding %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %C Barcelona, Spain %V 3727 %P 131-145 %8 June %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 2005 %T Information-theoretic analysis of security in side-informed data hiding %A Luis Pérez-Freire %A Pedro Comesaña %A Fernando Pérez-González %E Mauro Barni %E Jordi Herrera-Joancomartí %E Stefan Katzenbeisser %E Fernando Pérez-González %K data-hiding %K security %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %V 3727 %P 131-145 %G eng %0 Conference Paper %B International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) %D 2005 %T An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios %A Pedro Comesaña %A Luis Pérez-Freire %A Fernando Pérez-González %K data-hiding %K security %K watermarking %B International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) %C Montreux, Switzerland %8 April %G eng %0 Journal Article %J IEEE Transactions on Signal Processing %D 2005 %T Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks %A Fernando Pérez-González %A C. Mosquera %A Mauro Barni %A Andrea Abrardo %K data-hiding %K watermarking %B IEEE Transactions on Signal Processing %V 53 %P 3960-3975 %8 October %G eng %0 Conference Paper %B International Workshop on Digital Watermarking (IWDW) %D 2005 %T The return of the sensitivity attack %A Pedro Comesaña %A Luis Pérez-Freire %A Fernando Pérez-González %E Mauro Barni %E Ingemar J. Cox %E Ton Kalker %E H. J. Kim %K data-hiding %K watermarking %B International Workshop on Digital Watermarking (IWDW) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %C Siena, Italy %V 3710 %P 260-274 %8 September %G eng %0 Conference Paper %B Conference on Communications and Multimedia Security (CMS) %D 2005 %T On reversibility of random binning techniques: multimedia perspectives %A Sviatoslav Voloshynovskiy %A Oleksiy Koval %A E. Topak %A Jose Emilio Vila-Forcén %A Pedro Comesaña %A Thierry Pun %K data-hiding %K watermarking %B Conference on Communications and Multimedia Security (CMS) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %C Salzburg, Austria %8 September %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2005 %T Robustness Improvement of Known-Host-State Watermarking Using Host Statistics %A Oleksiy Koval %A Sviatoslav Voloshynovskiy %A Frederic Deguillaume %A Fernando Pérez-González %A Thierry Pun %E Edward J. Delp %E Ping W. Wong %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2005 %T Spread-spectrum vs. quantization-based data hiding: misconceptions and implications %A Luis Pérez-Freire %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2005 %T Worst case additive attack against quantization-based data-hiding methods %A Jose Emilio Vila-Forcén %A Sviatoslav Voloshynovskiy %A Oleksiy Koval %A Fernando Pérez-González %A Thierry Pun %E Edward J. Delp %E Ping W. Wong %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2004 %T Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm %A Félix Balado %A Fernando Pérez-González %A Pedro Comesaña %E Edward J. Delp %E Ping W. Wong %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 805-815 %8 January %G eng %0 Conference Paper %B International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) %D 2004 %T Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation %A Félix Balado %A Fernando Pérez-González %K data-hiding %K watermarking %B International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) %C Lisboa %8 April %G eng %0 Conference Paper %B International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) %D 2004 %T Improved Binary Dither-Modulation with perceptual constraints %A Fernando Pérez-González %A Pedro Comesaña %K data-hiding %K watermarking %B International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS) %C Lisboa, Portugal %8 April %G eng %0 Conference Paper %B Security, Steganography, and Watermarking of Multimedia Contents %D 2004 %T Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach %A Pedro Comesaña %A Fernando Pérez-González %E Edward J. Delp %E Ping W. Wong %K data-hiding %K watermarking %B Security, Steganography, and Watermarking of Multimedia Contents %S Proc. of SPIE %I SPIE %C San Jose, California, USA %V 5306 %P 592-601 %8 January %G eng %0 Conference Paper %B IEEE International Workshop on Multimedia Signal Processing %D 2004 %T Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks %A Fernando Pérez-González %A Mauro Barni %A Andrea Abrardo %A C. Mosquera %K data-hiding %K watermarking %B IEEE International Workshop on Multimedia Signal Processing %C Siena, Italy %P 139-142 %8 29 Sept - 1 Oct %G eng %0 Conference Paper %B IEEE International Workshop on Multimedia Signal Processing %D 2004 %T Revealing the true achievable rates of Scalar Costa Scheme %A Luis Pérez-Freire %A Fernando Pérez-González %A Sviatoslav Voloshynovskiy %K data-hiding %K watermarking %B IEEE International Workshop on Multimedia Signal Processing %C Siena, Italy %P 203-206 %8 29 Sept - 1 Oct %G eng %0 Thesis %D 2003 %T Digital image data hiding using side information %A Félix Balado %K data-hiding %K watermarking %I University of Vigo, Spain %G eng %9 phd %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2003 %T Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks. %A Fernando Pérez-González %A Pedro Comesaña %A Félix Balado %K data-hiding %K watermarking %B IEEE International Conference on Image Processing (ICIP) %I IEEE %C Barcelona, Spain %G eng %0 Conference Paper %B Security and Watermarking of Multimedia Contents %D 2003 %T Hexagonal Quantizers are not Optimal for 2-D Data Hiding %A Félix Balado %A Fernando Pérez-González %E Ping W. Wong %E Edward J. Delp %K data-hiding %K watermarking %B Security and Watermarking of Multimedia Contents %S Proc. of SPIE %C Santa Clara, USA %V 5020 %8 jan %G eng %0 Conference Paper %B International Workshop on Digital Watermarking (IWDW) %D 2003 %T The Importance of aliasing in structured quantization index modulation data hiding (invited lecture) %A Fernando Pérez-González %K data-hiding %K watermarking %B International Workshop on Digital Watermarking (IWDW) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %V 2939 / 2004 %P 1-17 %8 October %G eng %0 Conference Paper %B International Workshop on Digital Watermarking (IWDW) %D 2003 %T Optimal Data-Hiding Strategies for Games with BER Payoffs %A Pedro Comesaña %A Fernando Pérez-González %A Félix Balado %E Ton Kalker %E Ingemar J. Cox %E Yong Man Ro %K data-hiding %K watermarking %B International Workshop on Digital Watermarking (IWDW) %S Lecture Notes in Computer Science %I Springer-Verlag Heidelberg %V 2939 / 2004 %P 101-116 %8 October %G eng %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2003 %T Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs %A Pedro Comesaña %A Fernando Pérez-González %A Félix Balado %K data-hiding %K watermarking %B IEEE International Conference on Image Processing (ICIP) %I IEEE %C Barcelona, Spain %8 sep %G eng %0 Journal Article %J IEEE Transactions on Signal Processing %D 2003 %T Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels %A Fernando Pérez-González %A Félix Balado %A Juan R. Hernández %K data-hiding %K watermarking %B IEEE Transactions on Signal Processing %V 51 %P 960-980 %G eng %0 Journal Article %J Signal Processing: Image Communication %D 2002 %T Analysis of Pilot-Based Synchronization Algorithms for Watermarking of Still Images %A Manuel Alvarez-Rodríguez %A Fernando Pérez-González %K data-hiding %K watermarking %B Signal Processing: Image Communication %V 17 %P 661-633 %8 September %G eng %0 Conference Paper %B IEEE International Conference on Multimedia and Expo (ICME) %D 2002 %T Improving Data Hiding Performance by Using Quantization in a Projected Domain %A Fernando Pérez-González %A Félix Balado %K data-hiding %K watermarking %B IEEE International Conference on Multimedia and Expo (ICME) %C Lausanne, Switzerland %8 August %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 2002 %T Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation %A Fernando Pérez-González %A Félix Balado %K data-hiding %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %I Springer-Verlag %C Noorwijkerhout, The Netherlands %8 October %G eng %0 Conference Paper %B IEEE International Conference on Multimedia and Expo (ICME) %D 2002 %T Provably or Probably Robust Data Hiding? %A Félix Balado %A Fernando Pérez-González %K data-hiding %K watermarking %B IEEE International Conference on Multimedia and Expo (ICME) %C Lausanne, Switzerland %8 August %G eng %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2002 %T Quantized Projection Data Hiding %A Fernando Pérez-González %A Félix Balado %K data-hiding %K watermarking %B IEEE International Conference on Image Processing (ICIP) %C Rochester (NY), USA %8 September %G eng %0 Journal Article %J Signal Processing %D 2001 %T Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications %A Fernando Pérez-González %A Juan R. Hernández %A Félix Balado %K data-hiding %K watermarking %B Signal Processing %V 81 %P 1215–1238 %8 June %G eng %0 Conference Paper %B Security and Watermarking of Multimedia Contents %D 2001 %T Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes %A Félix Balado %A Fernando Pérez-González %E Ping W. Wong %E Edward J. Delp %K data-hiding %K watermarking %B Security and Watermarking of Multimedia Contents %S Proc. of SPIE %C San José, USA %V 4314 %P 532–543 %8 January %G eng %0 Conference Paper %B IEEE International Conference on Image Processing (ICIP) %D 2001 %T Turbo Coding for Sample-Level Watermarking in the DCT Domain %A Félix Balado %A Fernando Pérez-González %A Sandro Scalise %K data-hiding %K watermarking %B IEEE International Conference on Image Processing (ICIP) %C Thessaloniki, Greece %P 1003–1006 %8 October %G eng %0 Journal Article %J IEEE Transactions on Image Processing %D 2000 %T DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure %A Juan R. Hernández %A Martín Amado %A Fernando Pérez-González %K data-hiding %K watermarking %B IEEE Transactions on Image Processing %V 9 %P 55–68 %8 January %G eng %0 Journal Article %J Signal Processing %D 2000 %T Improving the Performance of Spatial Watermarking of Images Using Channel Coding %A Juan R. Hernández %A José M. Rodríguez %A Fernando Pérez-González %K data-hiding %K watermarking %B Signal Processing %V 80 %P 1261-1279 %8 July %G eng %0 Conference Paper %B Workshop on Nonlinear Signal and Image Processing %D 1999 %T Novel Detector Structures for Watermark Extraction in the DCT Domain %A Juan R. Hernández %A Martín Amado %A Fernando Pérez-González %K data-hiding %K watermarking %B Workshop on Nonlinear Signal and Image Processing %I IEEE-EURASIP %C Antalya, Turkey %8 June %G eng %0 Journal Article %J Proc. of the IEEE %D 1999 %T Statistical Analysis of Watermarking Schemes for Copyright Protection of Images %A Juan R. Hernández %A Fernando Pérez-González %K data-hiding %K watermarking %B Proc. of the IEEE %V 87 %P 1142–1166 %8 July %G eng %0 Conference Paper %B IEEE Annual Carnahan Conference on Security Technology %D 1999 %T A Tutorial on Digital Watermarking %A Fernando Pérez-González %A Juan R. Hernández %K data-hiding %K watermarking %B IEEE Annual Carnahan Conference on Security Technology %C Madrid, Spain %8 October %G eng %0 Conference Paper %B COST #254 Int. Workshop on Intelligent Communications %D 1998 %T Coding and Synchronization: A Boost and a Bottleneck for the Development of Image Watermarking %A Juan R. Hernández %A Fernando Pérez-González %A José M. Rodríguez %K data-hiding %K watermarking %B COST #254 Int. Workshop on Intelligent Communications %I SSGRR %C L'Aquila, Italy %P 77–82 %8 June %G eng %0 Conference Paper %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %D 1998 %T The Impact of Channel Coding on the Performance of Spatial Watermarking for Copyright Protection %A Juan R. Hernández %A Fernando Pérez-González %A José M. Rodríguez %K data-hiding %K watermarking %B IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) %C Seattle, Washington, USA %V 5 %P 2973–2976 %8 May %G eng %0 Conference Paper %B COST #254 Int. Workshop on Intelligent Communications and Multimedia Terminals %D 1998 %T Improving DCT-Domain Watermark Extraction Using Generalized Gaussian Models %A Juan R. Hernández %A Fernando Pérez-González %A Martín Amado %K data-hiding %K watermarking %B COST #254 Int. Workshop on Intelligent Communications and Multimedia Terminals %C Ljubljana, Slovenia %P 23–26 %8 November %G eng %0 Journal Article %J IEEE Journal on Selected Areas in Communications %D 1998 %T Performance Analysis of a 2D-Multipulse Amplitude Modulation Scheme for Data Hiding and Watermarking of Still Images %A Juan R. Hernández %A Fernando Pérez-González %A José M. Rodríguez %A Gustavo Nieto %K data-hiding %K watermarking %B IEEE Journal on Selected Areas in Communications %V 16 %P 510–524 %8 May %G eng %0 Conference Paper %B International Workshop on Information Hiding (IH) %D 1998 %T Throwing More Light on Image Watermarks %A Juan R. Hernández %A Fernando Pérez-González %K data-hiding %K watermarking %B International Workshop on Information Hiding (IH) %S Lecture Notes in Computer Science %I Springer-Verlag %C Portland, Oregon, USA %V 1525 %P 191–207 %8 April %G eng %0 Conference Paper %B Emerging Techniques for Communication Terminals %D 1997 %T Data Hiding for Copyright Protection of Still Images %A Juan R. Hernández %A Fernando Pérez-González %A José M. Rodríguez %K data-hiding %K watermarking %B Emerging Techniques for Communication Terminals %I ENSEEIHT %C Tolouse, France %P 285–289 %8 July %G eng