2009
L. Pérez-Freire y Furon, T., «Blind decoder for binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
T. Furon y Pérez-Freire, L., «EM decoding of Tardos traitor tracing codes», in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
T. Furon, Pérez-Freire, L., Guyader, A., y Cérou, F., «Estimating the minimal length of Tardos code», in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
L. Pérez-Freire y Pérez-González, F., «Spread spectrum watermarking security», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
J. R. Troncoso-Pastoriza, Comesaña, P., Pérez-Freire, L., y Pérez-González, F., «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.Icono PDF drm18-troncoso.pdf (417.17 KB)
T. Furon y Pérez-Freire, L., «Worst case attacks against binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
2006
L. Pérez-Freire, Pérez-González, F., y Voloshynovskiy, S., «An accurate analysis of scalar quantization-based data-hiding», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
L. Pérez-Freire, Pérez-González, F., y Furon, T., «On achievable security levels for lattice data hiding in the Known Message Attack scenario», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.Archivo iee-06bnsa.ps (1.67 MB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.Archivo spie06_sensitivity.ps (1.62 MB)
L. Pérez-Freire, Pérez-González, F., y Comesaña, P., «Secret dither estimation in lattice-quantization data hiding: a set-membership approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.Icono PDF spie06_sme.pdf (223.01 KB)
L. Pérez-Freire, Pérez-González, F., Furon, T., y Comesaña, P., «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.Icono PDF tifs06security.pdf (563.51 KB)
L. Pérez-Freire, Comesaña, P., Troncoso-Pastoriza, J. R., y Pérez-González, F., «Watermarking security: a survey», Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006.Icono PDF survey06security.pdf (268.87 KB)
2005
L. Pérez-Freire, Comesaña, P., y Pérez-González, F., «Detection in quantization-based watermarking: performance and security issues», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.Icono PDF spie05_secur.pdf (401.96 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145.Icono PDF ih05_fundamentals.pdf (222.99 KB)
L. Pérez-Freire, Comesaña, P., y Pérez-González, F., «Information-theoretic analysis of security in side-informed data hiding», in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145.Icono PDF ih05_sideinformed.pdf (218.44 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005.Icono PDF wiamis05.pdf (119.47 KB)
P. Comesaña, Pérez-Freire, L., y Pérez-González, F., «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.Icono PDF iwdw05.pdf (190.47 KB)