«Joint precoding and predistortion techniques for satellite telecommunication systems», in International Workshop on Satellite and Space Communications (IWSSC), Siena, Italy, 2005.
«Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks», IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, «Realizable minimum mean-squared error channel shorteners», IEEE Transactions on Signal Processing, vol. 53, pp. 4354–4362, 2005. T_SP_02192_2004.pdf (149.65 KB)
, «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, «On reversibility of random binning techniques: multimedia perspectives», in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005. cms05.pdf (267.92 KB)
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Spread-spectrum vs. quantization-based data hiding: misconceptions and implications», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Worst case additive attack against quantization-based data-hiding methods», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «An accurate analysis of scalar quantization-based data-hiding», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, «On achievable security levels for lattice data hiding in the Known Message Attack scenario», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, «Analysis of non-data-aided magnitude gain estimators», in International Symposium on Image/Video Communications (ISIVC), Hammamet, Tunisia, 2006.
, «Blind carrier phase estimation for non-equiprobable constellations», in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2006.
, «Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
, «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sensitivity.ps (1.62 MB)
, «On distortion-compensated Dither Modulation data-hiding with repetition coding», IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
, «High-rate quantization data hiding robust to arbitrary linear filtering attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, «The impact of the cropping attack on scalar STDM data hiding», IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006. ieee-spl06_cropping.ps (243.75 KB)
, «Improving the performance of RDM watermarking by means of trellis coded quantisation», IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006.
, «A novel model for the print-and-capture channel in 2D bar codes», in International Workshop on Multimedia Content Representation, Classification and Security, Istambul, Turkey, 2006, vol. 4105, pp. 627-634.
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», Signal Processing, vol. 86, pp. 1076-1088, 2006.
, «Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation», International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006.
, «Secret dither estimation in lattice-quantization data hiding: a set-membership approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, «Side-informed data hiding: robustness and security analysis», University of Vigo, Spain, 2006. thesis_pedro.pdf (2.18 MB)
, «Symbol-Rate Estimation for DVB-S2 Broadcasting», in International Workshop on Signal Processing for Space Communications (SPSC), 2006.
,