Exportar 62 resultados:
Autor Título [ Tipo] Año Filtros: Autor es Pedro Comesaña [Elimina todos los filtros]
«Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03a.pdf (145.04 KB)
, «Dither modulation in the logarithmic domain», in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264. iwdw07.pdf (183.38 KB)
, «Detection of video double encoding with GOP size estimation», in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156. wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, «Detection in quantization-based watermarking: performance and security issues», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, «Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains», in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012. wifs12_distinguishability.pdf (265.05 KB)
, «A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection», in EUSIPCO, Belgrade, Serbia, 2022. EUSIPCO22_erodriguez_dvazquez_fperez_pcomesan.pdf (518.97 KB)
, «On the capacity of stegosystems», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264. acm07stego.pdf (198.41 KB)
, «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sensitivity.ps (1.62 MB)
, «Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815. spie04em.pdf (434.03 KB)
, «Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819. spie08one-bit-wm.pdf (277.85 KB)
, «Are you threatening me? Towards smart detectors in watermarking», in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014. spie14_2.0.pdf (430.73 KB)
, «Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_dpc.pdf (165.56 KB)
,