Exportar 62 resultados:
Autor Título [ Tipo(Asc)] Año
Filtros: Autor es Pedro Comesaña  [Elimina todos los filtros]
Journal Article
L. Pérez-Freire, Comesaña, P., Troncoso-Pastoriza, J. R., y Pérez-González, F., «Watermarking security: a survey», Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006.Icono PDF survey06security.pdf (268.87 KB)
B. Tondi, Comesaña, P., Pérez-González, F., y Barni, M., «Smart Detection of Line-Search Oracle Attacks», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 3, pp. 588-603, 2017.Icono PDF TIFS_smartOracle.pdf (3.73 MB)
L. Pérez-Freire, Pérez-González, F., Furon, T., y Comesaña, P., «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.Icono PDF tifs06security.pdf (563.51 KB)
D. Vázquez-Padín, Pérez-González, F., y Comesaña, P., «A Random Matrix Approach to the Forensic Analysis of Upscaled Images», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 9, pp. 2115-2130, 2017.Icono PDF TIFS17_resampling.pdf (1.04 MB)
G. Domínguez-Conde, Comesaña, P., y Pérez-González, F., «Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.Icono PDF tifs09performanceanalysis.pdf (232.67 KB)
P. Comesaña y Pérez-González, F., «The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.Archivo ieee-spl06_cropping.ps (243.75 KB)
V. Conotter, Comesaña, P., y Pérez-González, F., «Forensic detection of processing operator chains: recovering the history of filtered JPEG images», IEEE Transactions on Information Forensics and Security, 2015.Icono PDF tifs.pdf (2.46 MB)
P. Comesaña, Pérez-González, F., y Balado, F., «On distortion-compensated Dither Modulation data-hiding with repetition coding», IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.Icono PDF dcdm_uvigo05.pdf (311.95 KB)
P. Comesaña y Pérez-González, F., «Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007.Icono PDF jis07bows.pdf (436.69 KB)Archivo Source code available here. (8.51 MB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.Archivo iee-06bnsa.ps (1.67 MB)
P. Comesaña, Merhav, N., y Barni, M., «Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime», IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.Icono PDF tit-2010.pdf (240.81 KB)
Conference Paper
P. Comesaña, Pérez-González, F., y Abdallah, C. T., «Witsenhausen's counterexample and its links with multimedia security problems», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.Icono PDF iwdw11_witsenhausen.pdf (152.97 KB)
P. Comesaña y Pérez-González, F., «Weber's law-based side-informed data hiding», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.Icono PDF comesanaicassp11.pdf (119.42 KB)
P. Comesaña y Pérez-González, F., «On a watermarking scheme in the logarithmic domain and its perceptual advantages», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.Icono PDF icip07logwat.pdf (77.03 KB)
J. R. Troncoso-Pastoriza, Comesaña, P., Pérez-Freire, L., y Pérez-González, F., «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.Icono PDF drm18-troncoso.pdf (417.17 KB)
P. Comesaña y Pérez-González, F., «Two different approaches for attacking BOWS», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.Icono PDF spie07bows.pdf (416.45 KB)
C. Pasquini, Comesaña, P., y Pérez-González, F., «Transportation-theoretic image counterforensics to first significant digit histogram forensics», in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014.Icono PDF cecilia_icassp2014.pdf (390.14 KB)
P. Comesaña y Pérez-González, F., «Taking advantage of source correlation in forensic analysis», in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164.Icono PDF mmsp13.pdf (167.27 KB)
D. Vázquez-Padín, Comesaña, P., y Pérez-González, F., «An SVD Approach to Forensic Image Resampling Detection», in EUSIPCO, 2015, pp. 2112-2116.Icono PDF eusipco15_dvazquez_pcomesan_fperez.pdf (169.61 KB)
D. Vázquez-Padín, Comesaña, P., y Pérez-González, F., «Set-Membership Identification of Resampled Signals», in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013.Icono PDF wifs13_dvazquez_pcomesan_fperez.pdf (171.35 KB)
J. R. Troncoso-Pastoriza, Comesaña, P., y Pérez-González, F., «Secure Direct and Iterative Protocols for Solving Systems of Linear Equations», in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.Icono PDF secure_sle_speedws09.pdf (193.97 KB)
L. Pérez-Freire, Pérez-González, F., y Comesaña, P., «Secret dither estimation in lattice-quantization data hiding: a set-membership approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.Icono PDF spie06_sme.pdf (223.01 KB)
S. Voloshynovskiy, Koval, O., Topak, E., Vila-Forcén, J. E., Comesaña, P., y Pun, T., «On reversibility of random binning techniques: multimedia perspectives», in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005.Icono PDF cms05.pdf (267.92 KB)