Solapas principales
«Blind decoder for binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
, «EM decoding of Tardos traitor tracing codes», in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
, «Estimating the minimal length of Tardos code», in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
, «Spread spectrum watermarking security», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
, «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009. drm18-troncoso.pdf (417.17 KB)
, «Worst case attacks against binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
, «Digital Watermarking Security», University of Vigo, Spain, 2008. ThesisPerezFreire.pdf (4.79 MB)
, «Security of lattice-based data hiding against the Watermarked Only Attack», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, «Disclosing secrets in watermarking and data hiding», in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
, «Exploiting security holes in lattice data hiding», in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.
, «Modeling Gabor coefficients via Generalized Gaussian Distributions for face recognition», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264. gonzalezjimenez_camera_ready.pdf (339.33 KB)
, «Practical estimators of the secret spreading vector for Improved Spread Spectrum modulations. Statistical analysis and results». Signal Theory and Communications Department, University of Vigo, Spain, 2007.
, «Security of Spread-Spectrum-Based Data Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «An accurate analysis of scalar quantization-based data-hiding», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, «On achievable security levels for lattice data hiding in the Known Message Attack scenario», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, «Blind Newton Sensitivity Attack», IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
, «The blind Newton senstivity attack», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sensitivity.ps (1.62 MB)
, «Secret dither estimation in lattice-quantization data hiding: a set-membership approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, «Watermarking security: a survey», Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB)
, «Detection in quantization-based watermarking: performance and security issues», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, «Fundamentals of data hiding security and their application to spread-spectrum analysis», in International Workshop on Information Hiding (IH), Barcelona, Spain, 2005, vol. 3727, pp. 131-145. ih05_fundamentals.pdf (222.99 KB)
, «Information-theoretic analysis of security in side-informed data hiding», in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145. ih05_sideinformed.pdf (218.44 KB)
, «An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios», in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005. wiamis05.pdf (119.47 KB)
, «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
,