Exportar 28 resultados:
[ Autor(Asc)] Título Tipo Año
Filtros: Autor es Pedro Comesaña  [Elimina todos los filtros]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
P. Comesaña, «Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains», in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.Icono PDF wifs12_distinguishability.pdf (265.05 KB)
P. Comesaña, Pérez-González, F., y Balado, F., «Optimal Data-Hiding Strategies for Games with BER Payoffs», in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.Archivo iwdw03.ps (499.03 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.Archivo iee-06bnsa.ps (1.67 MB)
P. Comesaña, Merhav, N., y Barni, M., «Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.Icono PDF spie08one-bit-wm.pdf (277.85 KB)
P. Comesaña y Pérez-González, F., «The optimal attack to histogram-based forensic detectors is simple(x)», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.Icono PDF wifs14.pdf (265.04 KB)
P. Comesaña, Pérez-González, F., y Balado, F., «On distortion-compensated Dither Modulation data-hiding with repetition coding», IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.Icono PDF dcdm_uvigo05.pdf (311.95 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.Icono PDF wiamis05.pdf (119.47 KB)
P. Comesaña y Pérez-González, F., «Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools», in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012.Icono PDF iwdw12.pdf (326.11 KB)
P. Comesaña y Pérez-González, F., «The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.Archivo ieee-spl06_cropping.ps (243.75 KB)
P. Comesaña y Pérez-González, F., «Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007.Icono PDF jis07bows.pdf (436.69 KB)Archivo Source code available here. (8.51 MB)
P. Comesaña y Pérez-González, F., «Taking advantage of source correlation in forensic analysis», in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164.Icono PDF mmsp13.pdf (167.27 KB)
P. Comesaña, Pérez-González, F., y Willems, F. M. J., «Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.Icono PDF spie05_dpc.pdf (165.56 KB)
P. Comesaña, Balado, F., y Pérez-González, F., «A Novel Interpretation of Content Authentication», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.Icono PDF spie07authentication.pdf (179.34 KB)
P. Comesaña, Pérez-González, F., y Abdallah, C. T., «Witsenhausen's counterexample and its links with multimedia security problems», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.Icono PDF iwdw11_witsenhausen.pdf (152.97 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.Archivo spie06_sensitivity.ps (1.62 MB)
P. Comesaña y Pérez-González, F., «Dither modulation in the logarithmic domain», in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.Icono PDF iwdw07.pdf (183.38 KB)
P. Comesaña, Pérez-González, F., y Liste, N., «Quantization lattice estimation for multimedia forensics», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.Icono PDF icip13.pdf (88.9 KB)
P. Comesaña y Pérez-González, F., «Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.Archivo spie04.ps (572.73 KB)
P. Comesaña y Pérez-González, F., «Two different approaches for attacking BOWS», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.Icono PDF spie07bows.pdf (416.45 KB)
P. Comesaña y Pérez-González, F., «Weber's law-based side-informed data hiding», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.Icono PDF comesanaicassp11.pdf (119.42 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.Icono PDF iwdw05.pdf (190.47 KB)
P. Comesaña y Pérez-González, F., «On the capacity of stegosystems», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.Icono PDF acm07stego.pdf (198.41 KB)
P. Comesaña y Pérez-González, F., «Optimal counterforensics for histogram-based forensics», in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052.Icono PDF icassp13.pdf (84.89 KB)Archivo Source code (5.47 MB)
P. Comesaña, Pérez-González, F., y Balado, F., «Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.Icono PDF icip03b.pdf (142.96 KB)
P. Comesaña, «Side-informed data hiding: robustness and security analysis», University of Vigo, Spain, 2006.Icono PDF thesis_pedro.pdf (2.18 MB)