«Zero-Knowledge watermark detector robust to sensitivity attacks», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
, «Worst case attacks against binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
, «Worst case additive attack against quantization-based watermarking techniques», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
, «Worst case additive attack against quantization-based data-hiding methods», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Witsenhausen's counterexample and its links with multimedia security problems», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.
iwdw11_witsenhausen.pdf (152.97 KB)
, 
«Wideband Spectrum Sensing in Cognitive Radio: Joint Estimation of Noise Variance and Multiple Signal Levels», in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Perugia, Italy, 2009.
, «Wideband Spectrum Sensing From Compressed Measurements Using Spectral Prior Information», IEEE Trans. Signal Process., vol. 61, pp. 6232-6246, 2013.
, «Wideband Spectral Estimation from Compressed Measurements Exploiting Spectral a priori Information in Cognitive Radio Systems», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, U.S.A., 2010.
, «Wideband self-interference cancellation for better spectrum use», in IEEE WoWMoM 2016 Workshop on Fifth Generation Wireless, 2016.
SIcancellationFinal.pdf (435.86 KB)
, 
«Wideband full-duplex MIMO relays with blind adaptive self-interference cancellation», Signal Processing, vol. 130, pp. 74-85, 2017.
SIGPRO_6170.pdf (1.41 MB)
, 
«Weber's law-based side-informed data hiding», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.
comesanaicassp11.pdf (119.42 KB)
, 
«Wavelet-packet-based subband adaptive equalization», Signal Processing, vol. 81, pp. 1641-1662, 2001.
, «Wavelet Packet based subband adaptive equalization», in Baiona Workshop on Emerging Technologies in Telecommunications, Baiona, Spain, 1999.
, «Watermarking security: a survey», Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006.
survey06security.pdf (268.87 KB)
, 
«On a watermarking scheme in the logarithmic domain and its perceptual advantages», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
icip07logwat.pdf (77.03 KB)
, 
«Visible Encryption: Using Paper as a Secure Channel», in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.
drm18-troncoso.pdf (417.17 KB)
, 
«Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint», IEEE Transactions on Information Forensics and Security, vol. 15, n.º 1, pp. 1815-1830, 2020.
TIFS19_GVPF.pdf (1.01 MB)
, 
«Uvi_Wave, the Ultimate Toolbox for Wavelet Transforms and Filter Banks», in Baiona Workshop on Intelligent Methods in Signal Processing and Communication, Baiona, Spain, 1996.
, «The use of unit norm tight measurement matrices for one-bit compressed sensing», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2016.
, «A Unified Framework for Dynamic Spectrum Leasing (DSL) in Cognitive Radios», in IEEE Broadband Wireless Access Workshop, 2009.
, «Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks», in IEEE Workshop on Information Forensics and Security, 2014.
wifs14.pdf (347.72 KB)
, 
«Understanding statistical disclosure: A least squares approach», in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57.
pets2012_fpg.pdf (450.58 KB)
, 
«A Two-Stage Codebook Building Method Using Fast WAN», in International Conference on Image Analysis and Processing (ICIAP), Venice, Italy, 1999, pp. 1047–1050.
, «A two-objective evolutionary approach based on topological constraints for node localization in wireless sensor networks», Applied Soft Computing, vol. 12, n.º 7, pp. 1891-1901, 2011.
asoc-d-10-00754r1.pdf (597.83 KB)
, 