Exportar 62 resultados:
Autor Título [ Tipo] Año Filtros: Autor es Pedro Comesaña [Elimina todos los filtros]
«A new method for perspective correction of document images», in Document Recognition and Retrieval, San Francisco, CA, 2011, vol. 7874, p. 787410. spie-2011.pdf (439.17 KB)
, «A Novel Interpretation of Content Authentication», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07authentication.pdf (179.34 KB)
, «The optimal attack to histogram-based forensic detectors is simple(x)», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142. wifs14.pdf (265.04 KB)
, «Optimal counterforensics for histogram-based forensics», in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052. icassp13.pdf (84.89 KB) Source code (5.47 MB)
, «Optimal Data-Hiding Strategies for Games with BER Payoffs», in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116. iwdw03.ps (499.03 KB)
, «Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03b.pdf (142.96 KB)
, «Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009. icip09domcomper.pdf (129.76 KB)
, «Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264. icassp07reproducible.pdf (67.03 KB)
, «Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601. spie04.ps (572.73 KB)
, «Quantization lattice estimation for multimedia forensics», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456. icip13.pdf (88.9 KB)
, «Random Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling», in International Tyrrhenian Workshop on Digital Communication 2017, Palermo, Italy, 2017, pp. 109-124. TIWDC17_dvazquez_fperez_pcomesan.pdf (394.61 KB)
, «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, «On reversibility of random binning techniques: multimedia perspectives», in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005. cms05.pdf (267.92 KB)
, «Secret dither estimation in lattice-quantization data hiding: a set-membership approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, «Secure Direct and Iterative Protocols for Solving Systems of Linear Equations», in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141. secure_sle_speedws09.pdf (193.97 KB)
, «Set-Membership Identification of Resampled Signals», in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013. wifs13_dvazquez_pcomesan_fperez.pdf (171.35 KB)
, «An SVD Approach to Forensic Image Resampling Detection», in EUSIPCO, 2015, pp. 2112-2116. eusipco15_dvazquez_pcomesan_fperez.pdf (169.61 KB)
, «Taking advantage of source correlation in forensic analysis», in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164. mmsp13.pdf (167.27 KB)
, «Transportation-theoretic image counterforensics to first significant digit histogram forensics», in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. cecilia_icassp2014.pdf (390.14 KB)
, «Two different approaches for attacking BOWS», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07bows.pdf (416.45 KB)
, «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009. drm18-troncoso.pdf (417.17 KB)
, «On a watermarking scheme in the logarithmic domain and its perceptual advantages», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264. icip07logwat.pdf (77.03 KB)
, «Weber's law-based side-informed data hiding», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843. comesanaicassp11.pdf (119.42 KB)
, «Witsenhausen's counterexample and its links with multimedia security problems», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011. iwdw11_witsenhausen.pdf (152.97 KB)
, «Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime», IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010. tit-2010.pdf (240.81 KB)
,