“Modeling Magnitudes of Gabor Coefficients: The β-Rayleigh Distribution”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, “Multiantenna detection of multicarrier primary signals exploiting spectral a priori information”, in International Conference on Cognitive Radio Oriented Wireless Networks and Communications (Crowncom), Hannover, Germany, 2009.
, “Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009. icip09domcomper.pdf (129.76 KB)
, “Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009. tifs09performanceanalysis.pdf (232.67 KB)
, “Secure Direct and Iterative Protocols for Solving Systems of Linear Equations”, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141. secure_sle_speedws09.pdf (193.97 KB)
, “Skewed Log-Stable model for natural images pixel block-variance”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, “Spread spectrum watermarking security”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
, “A Unified Framework for Dynamic Spectrum Leasing (DSL) in Cognitive Radios”, in IEEE Broadband Wireless Access Workshop, 2009.
, “Videosurveillance and privacy: covering the two sides of the mirror with DRM”, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009. drm18-troncoso.pdf (417.17 KB)
, “Wideband Spectrum Sensing in Cognitive Radio: Joint Estimation of Noise Variance and Multiple Signal Levels”, in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Perugia, Italy, 2009.
, “Worst case attacks against binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
, “Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819. spie08one-bit-wm.pdf (277.85 KB)
, “Digital Watermarking Security”, University of Vigo, Spain, 2008. ThesisPerezFreire.pdf (4.79 MB)
, “Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding”, in International Workshop on Information Hiding (IH), Santa Barbara, CA, U.S.A., 2008.
, “Distributed Estimation: Do Not Trust Gossips”, in Sensor, Signal and Information Processing (SenSIP) Workshop, Sedona (Arizona), 2008.
, “Distributed Estimation with Noisy Exchanges”, in IEEE International Workshop on Signal Processing Advances in Wireless Communications, Recife, Brazil, 2008.
, “Distributed Sequential Estimation with Noisy, Correlated Observations”, IEEE Signal Processing Letters, vol. 15, 2008.
, “Entangled Kalman Filters for Cooperative Estimation”, in IEEE Sensor Array and Multichannel Signal Processing Workshop, Darmstadt (Germany), 2008.
, “A family of frequency estimators using higher-order sample covariance lags for real sinusoid detection”, in European Signal Processing Conference (EUSIPCO), Lausanne, Switzerland, 2008.
, “Lattice implementation of Sum-squared Auto-correlation Minimization (SAM) channel shortener”, in European Signal Processing Conference (EUSIPCO), Lausanne, Switzerland, 2008.
, “Maximum Likelihood SNR Estimation for Asynchronously Oversampled OFDM Signals”, in IEEE International Workshop on Signal Processing Advances in Wireless Communications, Recife, Brazil, 2008.
, “ML and EM Algorithm for non-data-aided SNR Estimation of Linearly Modulated Signals”, in International Symposium on Communication Systems, Networks and Signal Processing (CNSDSP), 2008, pp. 530-534.
, “Non-Data-Aided Symbol Rate Estimation of Linearly Modulated Signals”, IEEE Transactions on Signal Processing, 2008.
, “Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, “Quantization-Based Methods: Additive Attacks Performance Analysis”, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
,