“An accurate analysis of scalar quantization-based data-hiding”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, “On achievable security levels for lattice data hiding in the Known Message Attack scenario”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, “Analysis of Pilot-Based Synchronization Algorithms for Watermarking of Still Images”, Signal Processing: Image Communication, vol. 17, pp. 661-633, 2002.
, “Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_dpc.pdf (165.56 KB)
, “Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications”, Signal Processing, vol. 81, pp. 1215–1238, 2001.
, “Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815. spie04em.pdf (434.03 KB)
, “Blind Newton Sensitivity Attack”, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
, “The blind Newton senstivity attack”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sensitivity.ps (1.62 MB)
, “Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, “Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks”, EURASIP Journal on Information Security, vol. 2007, 2007. jis07bows.pdf (436.69 KB) Source code available here. (8.51 MB)
, “On the capacity of stegosystems”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264. acm07stego.pdf (198.41 KB)
, “Coding and Synchronization: A Boost and a Bottleneck for the Development of Image Watermarking”, in COST #254 Int. Workshop on Intelligent Communications, L'Aquila, Italy, 1998, pp. 77–82.
, “Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes”, in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
, “Data Hiding for Copyright Protection of Still Images”, in Emerging Techniques for Communication Terminals, Tolouse, France, 1997, pp. 285–289.
, “DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure”, IEEE Transactions on Image Processing, vol. 9, pp. 55–68, 2000.
, “Detection in quantization-based watermarking: performance and security issues”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, “Digital image data hiding using side information”, University of Vigo, Spain, 2003.
, “Digital Watermarking Security”, University of Vigo, Spain, 2008. ThesisPerezFreire.pdf (4.79 MB)
, “Disclosing secrets in watermarking and data hiding”, in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
, “On Distortion Measures Associated to Random Desynchronization Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
, “Dither modulation in the logarithmic domain”, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264. iwdw07.pdf (183.38 KB)
, “Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03a.pdf (145.04 KB)
, “Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks”, EURASIP Journal on Information Security, 2007.
,