«Number Theoretic Transforms for Secure Signal Processing», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 5, pp. 1125-1140, 2017. PTP17_TIFS.pdf (651.54 KB)
, «Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation», in IEEE International Workshop on Information Forensics and Security (WIFS), 2020. PTGGP20-WIFS20.pdf (645.17 KB)
, «Secure Collaborative Camera Attribution», in European Interdisciplinary Cybersecurity Conference (EICC), Barcelona, Spain, 2022, pp. 97-98.
, «Camera Attribution Forensic Analyzer in the Encrypted Domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018. PMTP18_WIFS18.pdf (655.48 KB)
, «Revisiting Multivariate Lattices for Encrypted Signal Processing», in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019. PTP19_IHMMSec19.pdf (1.67 MB)
, «Multiquadratic rings and oblivious linear function evaluation», TEMat monográficos, vol. 2, n.º Proceedings of the 3rd BYMAT Conference, pp. 83-86, 2021. P21-TM21.pdf (592.53 KB)
, «Image denoising in the encrypted domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016. PTP16_WIFS16.pdf (527.76 KB)
, «Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation», in IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023, pp. 612-617.
, «Homomorphic Lattice Cryptosystems for Secure Signal Processing», University of Vigo, Vigo, 2019. thesis-pedrouzo-ulloa.pdf (6.16 MB)
, «New Improvements in ARCO», in Audio Engineering Society Convention (AES Convention), Munich, Germany, 1997.
, «ARCO (Adaptive Resolution COdec): A Hybrid Approach to Perceptual Audio Coding», in Audio Engineering Society Convention (AES Convention), Copenhagen, Denmark, 1996.
, «A Diffusion-based distributed EM algorithm for density estimation in wireless sensor networks», in Int. Conf. Acoust., Speech, Signal Process. (ICASSP), 2013. ssp_apz_rlv_final.pdf (482.6 KB)
, «A Diffusion-Based EM Algorithm for Distributed Estimation in Unreliable Sensor Networks», IEEE Signal Processing Letters, vol. 20, n.º 6, pp. 595-598, 2013. LSP2260329.pdf (326.39 KB)
, «Distributed TLS Estimation under Random Data Faults», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Brisbane, Australia, 2015. SSP_APZ_RLV.pdf (244.73 KB)
, «Parameter estimation in wireless sensor networks with faulty transducers: A distributed EM approach», Signal Processing, vol. 144, pp. 226-237, 2018.
, «Blind decoder for binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
, «An accurate analysis of scalar quantization-based data-hiding», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, «On achievable security levels for lattice data hiding in the Known Message Attack scenario», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, «Digital Watermarking Security», University of Vigo, Spain, 2008. ThesisPerezFreire.pdf (4.79 MB)
, «Security of Spread-Spectrum-Based Data Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, «Secret dither estimation in lattice-quantization data hiding: a set-membership approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, «Detection in quantization-based watermarking: performance and security issues», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, «Security of lattice-based data hiding against the Watermarked Only Attack», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, «Disclosing secrets in watermarking and data hiding», in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
,