Export 129 results:
Author Title Type [ Year
Filters: First Letter Of Last Name is C [Clear All Filters]
“Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains”, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.
wifs12_distinguishability.pdf (265.05 KB)
, 
“Detection of video double encoding with GOP size estimation”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156.
wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, 
“IPTV streaming source classification”, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.
iptv.pdf (103.17 KB)
, 
“ML Estimation of the Resampling Factor”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 205-210.
wifs2012_dvazquez_pcomesan.pdf (185.32 KB)
, 
“Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools”, in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012.
iwdw12.pdf (326.11 KB)
, 
“Bit Loading Using Imperfect CSIT for Prediction-Based Resource Allocation in Mobile OFDMA”, Vehicular Technology, IEEE Transactions on, vol. 60, pp. 4082 -4088, 2011.
, “Hybrid Space-Ground Processing for High-Capacity Multi-beam Satellite Systems”, in IEEE GLOBECOM, Houston, Texas, USA, 2011.
arna1112hybrid.pdf (182.79 KB)
, 
“Hybrid Space-Ground Processing for High-Capacity Multi-beam Satellite Systems”, in IEEE GLOBECOM, Houston, Texas, USA, 2011.
arna1112hybrid.pdf (182.79 KB)
, 
“Low-Complexity Channel Prediction Using Approximated Recursive DCT”, Circuits and Systems I: Regular Papers, IEEE Transactions on, vol. 58, pp. 2520 -2530, 2011.
, “A new method for perspective correction of document images”, in Document Recognition and Retrieval, San Francisco, CA, 2011, vol. 7874, p. 787410.
spie-2011.pdf (439.17 KB)
, 
“Prediction based resource allocation in OFDMA”, in Information Sciences and Systems (CISS), 2011 45th Annual Conference on, 2011, pp. 1 -4.
, “Weber's law-based side-informed data hiding”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.
comesanaicassp11.pdf (119.42 KB)
, 
“Witsenhausen's counterexample and its links with multimedia security problems”, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.
iwdw11_witsenhausen.pdf (152.97 KB)
, 
“Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime”, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.
tit-2010.pdf (240.81 KB)
, 
“Closed-form real single-tone frequency estimator based on a normalized IIR notch filter”, Signal Processing, vol. 90, pp. 1905-1915, 2010.
ieee_version_finale_july_2008.pdf (193.5 KB)
, 
“A finite interval constant modulus criterion for multicarrier channel shortening”, in European Wireless, Lucca, Italy, 2010.
, “Frequency estimation of real-valued single-tone in colored noise using multiple autocorrelation lags”, Signal Processing, vol. 90, pp. 2303-2307, 2010.
colored_noise_letter.pdf (111 KB)
, 
“Leaving Timing Channel Fingerprints in Hidden Service Log Files”, in Digital Forensic Research Workshop Annual Conference (DFRWS), Portland, Oregon, 2010.
, “Leaving Timing Channel Fingerprints in Hidden Service Log Files”, Digital Investigation, 2010.
, “Estimating the minimal length of Tardos code”, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
, “Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
icip09domcomper.pdf (129.76 KB)
, 
“Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.
tifs09performanceanalysis.pdf (232.67 KB)
, 
“Secure Direct and Iterative Protocols for Solving Systems of Linear Equations”, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.
secure_sle_speedws09.pdf (193.97 KB)
, 
“Videosurveillance and privacy: covering the two sides of the mirror with DRM”, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.
drm18-troncoso.pdf (417.17 KB)
, 
“Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.
spie08one-bit-wm.pdf (277.85 KB)
, 