“Quantization-Based Methods: Additive Attacks Performance Analysis”, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, “Security of lattice-based data hiding against the Watermarked Only Attack”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, “High-rate data-hiding robust to linear filtering for colored hosts”, EURASIP Journal on Information Security, 2009.
, “Spread spectrum watermarking security”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 2-24, 2009.
, “Leaving Timing Channel Fingerprints in Hidden Service Log Files”, Digital Investigation, 2010.
,