Solapas principales
«A Random Matrix Approach to the Forensic Analysis of Upscaled Images», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 9, pp. 2115-2130, 2017.
TIFS17_resampling.pdf (1.04 MB)
, 
«Random Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling», in International Tyrrhenian Workshop on Digital Communication 2017, Palermo, Italy, 2017, pp. 109-124.
TIWDC17_dvazquez_fperez_pcomesan.pdf (394.61 KB)
, 
«Secure Genomic Susceptibility Testing based on Lattice Encryption», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017.
TPP17_ICASSP17.pdf (403.53 KB)
, 
«Smart Detection of Line-Search Oracle Attacks», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 3, pp. 588-603, 2017.
TIFS_smartOracle.pdf (3.73 MB)
, 
«Statistical detection of JPEG traces in digital images in uncompressed formats», IEEE Transactions on Information Forensics and Security, vol. 12, n.º Pending, 2017.
TIFSbenford.pdf (5.94 MB)
, , 
«Data Hiding Robust to Mobile Communication Vocoders», IEEE Transactions on Multimedia, vol. 18, n.º 12, pp. 2345-2357, 2016.
TMM2599149.pdf (3.04 MB)
, 
«Design of pool mixes against profiling attacks in real conditions», IEEE/ACM Transactions on Networking, vol. 24, n.º 6, pp. 3662-3675, 2016.
TNET2547391_author_version.pdf (1.96 MB)
, 
«Dynamic Privacy-Preserving Genomic Susceptibility Testing», in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50.
IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, 
«Fast Sequential Forensic Detection of Camera Fingerprint», in IEEE International Conference on Image Processing (ICIP), 2016.
perez.pdf (325.29 KB)
, 
«Forensics of high quality and nearly identical JPEG image recompression», in ACM Workshop on Information Hiding and Multimedia Security, 2016.
HQ_multipleJPEG.pdf (1.33 MB)
, 
«Image denoising in the encrypted domain», in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016.
PTP16_WIFS16.pdf (527.76 KB)
, , , 
«Forensic detection of processing operator chains: recovering the history of filtered JPEG images», IEEE Transactions on Information Forensics and Security, 2015.
tifs.pdf (2.46 MB)
, 
«Multivariate Lattices for Encrypted Image Processing», in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015.
PedrouzoICASSP2015.pdf (348.56 KB)
, 
«An SVD Approach to Forensic Image Resampling Detection», in EUSIPCO, 2015, pp. 2112-2116.
eusipco15_dvazquez_pcomesan_fperez.pdf (169.61 KB)
, 
«Are you threatening me? Towards smart detectors in watermarking», in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
«A Benford-Fourier JPEG compression detector», in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014.
benford_icip_rice_new.pdf (235.58 KB)
, 
«Do dummies pay off? Limits of dummy traffic protection in anonymous communications», in Privacy Enhancing Technologies Symposium, 2014.
pets14.pdf (421.61 KB)
Matlab files used to perform the experiments in the paper. (5.55 KB)
, 

«Flat Fading Channel Estimation Based on Dirty Paper Coding», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014.
icassp14_gdc_pca_fpg.pdf (154.64 KB)
, 
«A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems», IEEE Transactions on Information Forensics and Security, 2014.
lsdaTIFS14.pdf (1.64 MB)
, 
«Multiple JPEG compression detection by means of Benford-Fourier coefficients», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
, «A New Look At ML Step-Size Estimation for Scalar Costa Scheme Data Hiding», in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014.
icip14.pdf (158.08 KB)
, 
«The optimal attack to histogram-based forensic detectors is simple(x)», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.
wifs14.pdf (265.04 KB)
, 