Exportar 62 resultados:
Autor [ Título
Filtros: Autor es Pedro Comesaña [Elimina todos los filtros]
«Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
«Are you threatening me? Towards smart detectors in watermarking», in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
«Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.
spie08one-bit-wm.pdf (277.85 KB)
, 
«Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime», IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.
tit-2010.pdf (240.81 KB)
, 
«Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.
spie04em.pdf (434.03 KB)
, 
«Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.
iee-06bnsa.ps (1.67 MB)
, 
«The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sensitivity.ps (1.62 MB)
, 
«Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007.
jis07bows.pdf (436.69 KB)
Source code available here. (8.51 MB)
, 

«On the capacity of stegosystems», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.
acm07stego.pdf (198.41 KB)
, 
«A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection», in EUSIPCO, Belgrade, Serbia, 2022.
EUSIPCO22_erodriguez_dvazquez_fperez_pcomesan.pdf (518.97 KB)
, 
«Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains», in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.
wifs12_distinguishability.pdf (265.05 KB)
, 
«Detection in quantization-based watermarking: performance and security issues», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_secur.pdf (401.96 KB)
, 
«Detection of video double encoding with GOP size estimation», in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156.
wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, 
«On distortion-compensated Dither Modulation data-hiding with repetition coding», IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.
dcdm_uvigo05.pdf (311.95 KB)
, 
«Dither modulation in the logarithmic domain», in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.
iwdw07.pdf (183.38 KB)
, 
«Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.
icip03a.pdf (145.04 KB)
, 
«Fast Sequential Forensic Detection of Camera Fingerprint», in IEEE International Conference on Image Processing (ICIP), 2016.
perez.pdf (325.29 KB)
, 
«Flat Fading Channel Estimation Based on Dirty Paper Coding», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014.
icassp14_gdc_pca_fpg.pdf (154.64 KB)
, 
«Forensic analysis of full-frame linearly filtered JPEG images», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521.
conotter.pdf (780.94 KB)
, 
«Forensic detection of processing operator chains: recovering the history of filtered JPEG images», IEEE Transactions on Information Forensics and Security, 2015.
tifs.pdf (2.46 MB)
, 
«Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.
ih05_fundamentals.pdf (222.99 KB)
, 
«The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.
ieee-spl06_cropping.ps (243.75 KB)
, 
«Improved Binary Dither-Modulation with perceptual constraints», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, Portugal, 2004.
wiamis04_dm.ps (268.36 KB)
, 
«Information-theoretic analysis of security in side-informed data hiding», in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145.
ih05_sideinformed.pdf (218.44 KB)
, 
«An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.
wiamis05.pdf (119.47 KB)
, 