Exportar 26 resultados:
Autor [ Título] Tipo Año Filtros: First Letter Of Last Name es K [Elimina todos los filtros]
«Aeronautical Channel Model for Broadband L-Band Satellite Communication», in AIAA International Communications Satellite Systems Conference (ICSSC), Rome, Italy, 2005.
, «A comparison of system architectures for intelligent document understanding», Signal Processing: Image Communication, vol. 9, pp. 1-19, 1996.
, «Data Hiding Robust to Mobile Communication Vocoders», IEEE Transactions on Multimedia, vol. 18, n.º 12, pp. 2345-2357, 2016. TMM2599149.pdf (3.04 MB)
, «Digital Satellite Communications», New York: Springer, 2007, p. -.
, «Full-stack Hybrid Beamforming in mmWave 5G Networks», in 2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet), 2021, pp. 1–7.
, «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, «Improving the Visual Performance of S/DISCUS», in IEEE International Conference on Multimedia and Expo (ICME), Barcelona, Catalonia, 2011.
, «Information-theoretic analysis of security in side-informed data hiding», in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145. ih05_sideinformed.pdf (218.44 KB)
, «Learning Power Spectrum Maps from Quantized Power Measurements», IEEE Transactions on Signal Processing, vol. 65, n.º 10, pp. 2547-2560, 2017. TSP2666775.pdf (1.11 MB)
, «Mask-Compliant Orthogonal Precoding for Spectrally Efficient OFDM», IEEE Transactions on Communications, vol. 69, n.º 3, pp. 1990-2001, 2021. TCOMM3041351.pdf (1.15 MB)
, «Optimal Data-Hiding Strategies for Games with BER Payoffs», in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116. iwdw03.ps (499.03 KB)
, «Overview of Use Cases in Single Channel Full Duplex Techniques for Satellite Communication», in 40th International Communications Satellite Systems Conference (ICSSC), 2023.
, «Privacy Preserving Error Resilient DNA Searching through Oblivious Automata», in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
, «Quantization-Based Methods: Additive Attacks Performance Analysis», Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, «Quantization-based watermarking performance improvement using host statistics: additive noise attack», in ACM Workshop on Multimedia and Security (MMSEC), Magdeburg, Germany, 2004.
, «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, «On reversibility of random binning techniques: multimedia perspectives», in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005. cms05.pdf (267.92 KB)
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», Signal Processing, vol. 86, pp. 1076-1088, 2006.
, «Satellite Communications: Research Trends and Open Issues», in International Workshop on Satellite and Space Communications (IWSSC), 2007.
, «A Secure Multidimensional Point Inclusion Protocol», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, «Spectrum Cartography using quantized observations», in IEEE Int. Conference on Acoustics, Speech and Signal Processing (ICASSP), Brisbane, Australia, 2015. Cartography.pdf (259.63 KB)
, «Spread Spectrum Watermarking for Real Images: Is Everything So Hopeless?», in European Signal Processing Conference (EUSIPCO), Vienna, Austria, 2004.
, «Worst case additive attack against quantization-based data-hiding methods», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
,