Exportar 62 resultados:
Autor Título [ Tipo] Año Filtros: Autor es Pedro Comesaña [Elimina todos los filtros]
«Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
, «Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007. jis07bows.pdf (436.69 KB) Source code available here. (8.51 MB)
, «On distortion-compensated Dither Modulation data-hiding with repetition coding», IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
, «Forensic detection of processing operator chains: recovering the history of filtered JPEG images», IEEE Transactions on Information Forensics and Security, 2015. tifs.pdf (2.46 MB)
, «The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006. ieee-spl06_cropping.ps (243.75 KB)
, «Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009. tifs09performanceanalysis.pdf (232.67 KB)
, «A Random Matrix Approach to the Forensic Analysis of Upscaled Images», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 9, pp. 2115-2130, 2017. TIFS17_resampling.pdf (1.04 MB)
, «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, «Smart Detection of Line-Search Oracle Attacks», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 3, pp. 588-603, 2017. TIFS_smartOracle.pdf (3.73 MB)
, «Watermarking security: a survey», Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB)
, ,
«Side-informed data hiding: robustness and security analysis», University of Vigo, Spain, 2006. thesis_pedro.pdf (2.18 MB)
,