Export 129 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is C [Clear All Filters]
“Detection of video double encoding with GOP size estimation”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156. wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, “IPTV streaming source classification”, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012. iptv.pdf (103.17 KB)
, “ML Estimation of the Resampling Factor”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 205-210. wifs2012_dvazquez_pcomesan.pdf (185.32 KB)
, “Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools”, in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012. iwdw12.pdf (326.11 KB)
, “Choose Your Subcarriers Wisely: Active Interference Cancellation for Cognitive OFDM”, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 4, pp. 615-625, 2013. spectrumshaping_final.pdf (3.05 MB)
, “A Cognitive Mobile BTS Solution with Software-Defined Radioelectric Sensing”, Sensors, vol. 13, no. 2, pp. 2051-2075, 2013. sensors-13-02051.pdf (2.93 MB)
, “Forensic analysis of full-frame linearly filtered JPEG images”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521. conotter.pdf (780.94 KB)
, “Forensic analysis of full-frame linearly filtered JPEG images”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521. conotter.pdf (780.94 KB)
, “Joint detection of full-frame linear filtering and JPEG compression in digital images”, in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013. wifs13_jpeg.pdf (1.02 MB)
, “Joint detection of full-frame linear filtering and JPEG compression in digital images”, in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013. wifs13_jpeg.pdf (1.02 MB)
, “Lattice implementation of adaptive channel shortening in multicarrier transmission over IIR channels”, EURASIP Journal on Advances in Signal Processing, vol. 2013:174, 2013.
, “MMSE Performance Analysis of Generalized Multibeam Satellite Channels”, Communications Letters, IEEE, pp. 1-4, 2013. 1211.5903v1.pdf (192.05 KB)
, “MMSE Performance Analysis of Generalized Multibeam Satellite Channels”, Communications Letters, IEEE, pp. 1-4, 2013. 1211.5903v1.pdf (192.05 KB)
, “Optimal counterforensics for histogram-based forensics”, in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052. icassp13.pdf (84.89 KB) Source code (5.47 MB)
, “Quantization lattice estimation for multimedia forensics”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456. icip13.pdf (88.9 KB)
, “Set-Membership Identification of Resampled Signals”, in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013. wifs13_dvazquez_pcomesan_fperez.pdf (171.35 KB)
, “Taking advantage of source correlation in forensic analysis”, in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164. mmsp13.pdf (167.27 KB)
, “Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014. spie14_2.0.pdf (430.73 KB)
, “Bootstrap-based Proxy Reencryption for Private Multi-user Computing”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014. TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, “Flat Fading Channel Estimation Based on Dirty Paper Coding”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. icassp14_gdc_pca_fpg.pdf (154.64 KB)
, “A New Look At ML Step-Size Estimation for Scalar Costa Scheme Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014. icip14.pdf (158.08 KB)
, “The optimal attack to histogram-based forensic detectors is simple(x)”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142. wifs14.pdf (265.04 KB)
, “Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation”, IEEE Transactions on Wireless Communications, pp. 1-1, 2014. multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
, “Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation”, IEEE Transactions on Wireless Communications, pp. 1-1, 2014. multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
, “Sensitivity of compressive sensing architectures based on time interleaved analog-to-digital converters to channel mismatches”, in IEEE International New Circuits and Systems Conference (NEWCAS), 2014.
,