Solapas principales
«Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
icip09domcomper.pdf (129.76 KB)
, 
«Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.
tifs09performanceanalysis.pdf (232.67 KB)
, 
«Secure Direct and Iterative Protocols for Solving Systems of Linear Equations», in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.
secure_sle_speedws09.pdf (193.97 KB)
, 
«Skewed Log-Stable model for natural images pixel block-variance», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, «Spread spectrum watermarking security», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
, «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.
drm18-troncoso.pdf (417.17 KB)
, 
«Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding», in International Workshop on Information Hiding (IH), Santa Barbara, CA, U.S.A., 2008.
, «Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, «Quantization-Based Methods: Additive Attacks Performance Analysis», Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, «Security of lattice-based data hiding against the Watermarked Only Attack», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, «Benford's Law in Image Processing», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007.
, «Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks», EURASIP Journal on Information Security, vol. 2007, 2007.
jis07bows.pdf (436.69 KB)
Source code available here. (8.51 MB)
, 

«On the capacity of stegosystems», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.
acm07stego.pdf (198.41 KB)
, 
Comunicaciones Digitales. Pearson - Prentice Hall, 2007.
, «Disclosing secrets in watermarking and data hiding», in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
, «On Distortion Measures Associated to Random Desynchronization Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Dither modulation in the logarithmic domain», in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.
iwdw07.pdf (183.38 KB)
, 
«Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks», EURASIP Journal on Information Security, 2007.
, «Exploiting security holes in lattice data hiding», in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.
, «A Generalization of Benford's Law and Its Application to Images», in European Control Conference (ECC), Kos, Greece, 2007.
, «Modeling Gabor coefficients via Generalized Gaussian Distributions for face recognition», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
gonzalezjimenez_camera_ready.pdf (339.33 KB)
, 
«A Novel Interpretation of Content Authentication», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07authentication.pdf (179.34 KB)
, 
«Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.
icassp07reproducible.pdf (67.03 KB)
, 
«Security of Spread-Spectrum-Based Data Hiding», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
,