“Efficient Protocols for Secure Adaptive Filtering”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863. secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, “Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience”, in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
, “Secure Adaptive Filtering”, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, “CryptoDSPs for Cloud Privacy”, in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
, “Secure and Private Medical Clouds using Encrypted Processing”, in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, “Secure Direct and Iterative Protocols for Solving Systems of Linear Equations”, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141. secure_sle_speedws09.pdf (193.97 KB)
, “Spread spectrum watermarking security”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
, “Videosurveillance and privacy: covering the two sides of the mirror with DRM”, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009. drm18-troncoso.pdf (417.17 KB)
, “Digital Watermarking Security”, University of Vigo, Spain, 2008. ThesisPerezFreire.pdf (4.79 MB)
, “Security of lattice-based data hiding against the Watermarked Only Attack”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, “Disclosing secrets in watermarking and data hiding”, in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
, “Exploiting security holes in lattice data hiding”, in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.
, “Practical estimators of the secret spreading vector for Improved Spread Spectrum modulations. Statistical analysis and results”. Signal Theory and Communications Department, University of Vigo, Spain, 2007.
, “Privacy Preserving Error Resilient DNA Searching through Oblivious Automata”, in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
, “A Secure Multidimensional Point Inclusion Protocol”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, “Security of Spread-Spectrum-Based Data Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “An accurate analysis of scalar quantization-based data-hiding”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, “On achievable security levels for lattice data hiding in the Known Message Attack scenario”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, “Secret dither estimation in lattice-quantization data hiding: a set-membership approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, “Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, “Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB)
, “Detection in quantization-based watermarking: performance and security issues”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, “Information-theoretic analysis of security in side-informed data hiding”, in International Workshop on Information Hiding (IH), 2005, vol. 3727, pp. 131-145. ih05_sideinformed.pdf (218.44 KB)
, “An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Montreux, Switzerland, 2005. wiamis05.pdf (119.47 KB)
,