Exportar 588 resultados:
[ Autor(Desc)] Título Tipo Año
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
M. Barni, Pérez-González, F., y Tondi, B., «DNN Watermarking: Four Challenges and a Funeral», in 2021 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC'21, Virtual Event Belgium, 2021, pp. 189-196.Icono PDF ihmm13-barniA.pdf (515.94 KB)
M. Barni y Pérez-González, F., «Coping with the enemy: Advances in adversary-aware signal processing», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, 2013, pp. 8682–8686.
C. Baum, Escudero, D., Pedrouzo-Ulloa, A., Scholl, P., y Troncoso-Pastoriza, J. R., «Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE», in International Conference on Security and Cryptography for Networks (SCN), 2020.Icono PDF BEPST20-SCN20.pdf (457.81 KB)
T. Bianchi, Piva, A., y Pérez-González, F., «Near optimal detection of quantized signals and application to JPEG forensics», 2013 IEEE International Workshop on Information Forensics and Security (WIFS). Guangzhou, China, pp. 168-173, 2013.Icono PDF wifs13_bianchi.pdf (293.74 KB)
G. Boato, Fontanari, C., Natale, D. F. G. B., y Pérez-González, F., «Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
L. Bondi, Bestagini, P., Pérez-González, F., y Tubaro, S., «Improving PRNU Compression Through Preprocessing, Quantization, and Coding», IEEE Transactions on Information Forensics and Security, vol. 14, n.º 3, p. 13, 2019.Icono PDF 2018_prnu_resize_deadzone.pdf (3.81 MB)
L. Bondi, Pérez-González, F., Bestagini, P., y Tubaro, S., «Design of projection matrices for PRNU compression», in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.Icono PDF 2017_prnu_projection.pdf (689.14 KB)
J. Borràs, Molina, F., López-Valcarce, R., y Sala, J., «Energy-efficient analog beamforming with short packets in millimeter-wave MIMO systems», in 2020 54th Asilomar Conference on Signals, Systems, and Computers, California, 2020, Virtual event, 2020.Icono PDF Asilomar2020.pdf (353.1 KB)
C
A. Casal, Serantes, C., González-Prelcic, N., y Pena, A. S., «Testing a Flexible Time-Frequency Mapping for High Frequencies in TARCO (Tonal Adaptive Resolution COdec)», in Audio Engineering Society Convention (AES Convention), Amsterdam, The Netherlands, 1998.
M. Caus, Pastore, A., Navarro, M., Ramírez, T., Mosquera, C., Noels, N., Alagha, N., y Perez-Neira, A. I., «Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems», in 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 2018.Icono PDF exploratory-analysis-superposition.pdf (288.42 KB)
M. Chowdhury, Manolakos, A., Gomez-Cuba, F., Erkip, E., y Goldsmith, A. J., «Capacity scaling in noncoherent wideband massive SIMO systems», in IEEE Information Theory Workshop (ITW), 2015.
D. Christopoulos, Arnau, J., Chatzinotas, S., Mosquera, C., y Ottersten, B., «MMSE Performance Analysis of Generalized Multibeam Satellite Channels», Communications Letters, IEEE, pp. 1-4, 2013.Icono PDF 1211.5903v1.pdf (192.05 KB)
P. Comesaña, «Side-informed data hiding: robustness and security analysis», University of Vigo, Spain, 2006.Icono PDF thesis_pedro.pdf (2.18 MB)
P. Comesaña, Merhav, N., y Barni, M., «Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.Icono PDF spie08one-bit-wm.pdf (277.85 KB)
P. Comesaña, Pérez-González, F., y Liste, N., «Quantization lattice estimation for multimedia forensics», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.Icono PDF icip13.pdf (88.9 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.Icono PDF iwdw05.pdf (190.47 KB)
P. Comesaña, Pérez-González, F., y Abdallah, C. T., «Witsenhausen's counterexample and its links with multimedia security problems», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.Icono PDF iwdw11_witsenhausen.pdf (152.97 KB)
P. Comesaña y Pérez-González, F., «Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.Archivo spie04.ps (572.73 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.Archivo iee-06bnsa.ps (1.67 MB)
P. Comesaña y Pérez-González, F., «Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007.Icono PDF jis07bows.pdf (436.69 KB)Archivo Source code available here. (8.51 MB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.Icono PDF ih05_fundamentals.pdf (222.99 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.Icono PDF wiamis05.pdf (119.47 KB)
P. Comesaña y Pérez-González, F., «Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools», in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012.Icono PDF iwdw12.pdf (326.11 KB)
P. Comesaña, Pérez-González, F., y Balado, F., «Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs», in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.Icono PDF icip03b.pdf (142.96 KB)
P. Comesaña y Pérez-González, F., «The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.Archivo ieee-spl06_cropping.ps (243.75 KB)