Solapas principales
«A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection», in EUSIPCO, Belgrade, Serbia, 2022.
EUSIPCO22_erodriguez_dvazquez_fperez_pcomesan.pdf (518.97 KB)
, 
«Secure Collaborative Camera Attribution», in European Interdisciplinary Cybersecurity Conference (EICC), Barcelona, Spain, 2022, pp. 97-98.
, «DNN Watermarking: Four Challenges and a Funeral», in 2021 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC'21, Virtual Event Belgium, 2021, pp. 189-196.
ihmm13-barniA.pdf (515.94 KB)
, 
«On the information leakage quantification of camera fingerprint estimates», Eurasip Journal on Information Security, vol. 2021, n.º 6, p. 18, 2021.
bmc_article.pdf (4.19 MB)
, 
«A Review of "Camera Attribution Forensic Analyzer in the Encrypted Domain"», in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021.
PMTP21-JNIC21.pdf (259.84 KB)
, 
«Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography», Mathematics, vol. 9, n.º 8, 2021.
PTGGP21.pdf (1.04 MB)
, 
«Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks», vol. 22, n.º 12, p. 36, 2020.
, «Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation», in IEEE International Workshop on Information Forensics and Security (WIFS), 2020.
PTGGP20-WIFS20.pdf (645.17 KB)
, 
«PRNU-leaks: facts and remedies», in 2020 28th European Signal Processing Conference (EUSIPCO), Virtual Event Amsterdam, 2020.
, «Temporal Localization of Non-Static Digital Videos Using the Electrical Network Frequency», IEEE Signal Processing Letters, vol. 27, p. 5, 2020.
, «Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint», IEEE Transactions on Information Forensics and Security, vol. 15, n.º 1, pp. 1815-1830, 2020.
TIFS19_GVPF.pdf (1.01 MB)
, 
«Dynamic Attribute-Based Privacy-Preserving Genomic Susceptibility Testing», in 34th Annual ACM Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, 2019.
SAC19Final.pdf (745.27 KB)
, 
«Efficient PRNU Matching in the Encrypted Domain», in XoveTIC, A Coruña, Spain, 2019.
PMTP19_XoveTIC19.pdf (517.32 KB)
, 
«Improving PRNU Compression Through Preprocessing, Quantization, and Coding», IEEE Transactions on Information Forensics and Security, vol. 14, n.º 3, p. 13, 2019.
2018_prnu_resize_deadzone.pdf (3.81 MB)
, 
«Prediction Residue Analysis in MPEG-2 Double Compressed Video Sequences», in EUSIPCO, A Coruña, Spain, 2019, pp. 1109-1113.
eusipco19_dvazquez_fperez.pdf (392.31 KB)
, 
«Rethinking Location Privacy for Unknown Mobility Behaviors», in IEEE European Symposium on Security and Privacy (EuroS&P), 2019.
ms.pdf (634.43 KB)
, 
«Revisiting Multivariate Lattices for Encrypted Signal Processing», in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019.
PTP19_IHMMSec19.pdf (1.67 MB)
, 
«Technical Report: MPEG-2 Prediction Residue Analysis», University of Vigo, 2019.
TR19.pdf (501.11 KB)
, 
«Camera Attribution Forensic Analyzer in the Encrypted Domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018.
PMTP18_WIFS18.pdf (655.48 KB)
, 
«Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals», in European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018.
Eusipco18_Masciopinto_PerezGonzalez.pdf (600.61 KB)
, 
«Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms», in ACM Conference on Computer and Communications Security (CCS), 2017.
CCSmain.pdf (1.82 MB)
, 
«Design of projection matrices for PRNU compression», in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.
2017_prnu_projection.pdf (689.14 KB)
, 
«Filter design for delay-based anonymous communications», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
ICASSPmain.pdf (382.42 KB)
, 
«Is Geo-Indistinguishability what you are looking for?», in Workshop on Privacy in the Electronic Society (WPES), 2017.
1709.06318.pdf (822.66 KB)
, 
«Number Theoretic Transforms for Secure Signal Processing», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 5, pp. 1125-1140, 2017.
PTP17_TIFS.pdf (651.54 KB)
, 