Export 129 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
S. Voloshynovskiy, Koval, O., Topak, E., Vila-Forcén, J. E., Comesaña, P., and Pun, T., On reversibility of random binning techniques: multimedia perspectives, in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005.PDF icon cms05.pdf (267.92 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The return of the sensitivity attack, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.PDF icon iwdw05.pdf (190.47 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The return of the sensitivity attack, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.PDF icon iwdw05.pdf (190.47 KB)
D. Vázquez-Padín, Pérez-González, F., and Comesaña, P., Random Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling, in International Tyrrhenian Workshop on Digital Communication 2017, Palermo, Italy, 2017, pp. 109-124.PDF icon TIWDC17_dvazquez_fperez_pcomesan.pdf (394.61 KB)
D. Vázquez-Padín, Pérez-González, F., and Comesaña, P., A Random Matrix Approach to the Forensic Analysis of Upscaled Images, IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115-2130, 2017.PDF icon TIFS17_resampling.pdf (1.04 MB)
Q
P. Comesaña, Pérez-González, F., and Liste, N., Quantization lattice estimation for multimedia forensics, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.PDF icon icip13.pdf (88.9 KB)
P. Comesaña and Pérez-González, F., Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.File spie04.ps (572.73 KB)
P
M. Barni, Pérez-González, F., Comesaña, P., and Bartoli, G., Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.PDF icon icassp07reproducible.pdf (67.03 KB)
J. R. Troncoso-Pastoriza, Katzenbeisser, S., and Celik, M., Privacy Preserving Error Resilient DNA Searching through Oblivious Automata, in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
J. F. Schmidt, Cousseau, J. E., Wichman, R., and Werner, S., Prediction based resource allocation in OFDMA, in Information Sciences and Systems (CISS), 2011 45th Annual Conference on, 2011, pp. 1 -4.
A. Pedrouzo-Ulloa, Boudguiga, A., Chakraborty, O., Sirdey, R., Stan, O., and Zuber, M., Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation, in IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023, pp. 612-617.
J. Arnau, Christopoulos, D., Chatzinotas, S., Mosquera, C., and Ottersten, B., Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation, IEEE Transactions on Wireless Communications, pp. 1-1, 2014.PDF icon multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
J. Arnau, Christopoulos, D., Chatzinotas, S., Mosquera, C., and Ottersten, B., Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation, IEEE Transactions on Wireless Communications, pp. 1-1, 2014.PDF icon multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
M. Álvarez-Díaz, Scalise, S., Sciascia, G., Mura, R., Conforto, P., Schena, V., and Ernst, H., Performance of DVB-S Air-Interface over Land Mobile Satellite Channel at Ku-Band for Fast Trains, in International Workshop on Signal Processing for Space Communications (SPSC), Catania, Italia, 2003.
G. Domínguez-Conde, Comesaña, P., and Pérez-González, F., Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.PDF icon tifs09performanceanalysis.pdf (232.67 KB)
G. Domínguez-Conde, Comesaña, P., and Pérez-González, F., Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.PDF icon icip09domcomper.pdf (129.76 KB)
O
V. Monzón Baeza, Mosquera, C., López-Valcarce, R., González-Ríos, J. L., Vasquez-Peralvo, J. A., Ramírez, T., Losada, P., Merlano, J. C., Chatzinotas, S., and Kisseleff, S., Overview of Use Cases in Single Channel Full Duplex Techniques for Satellite Communication, in 40th International Communications Satellite Systems Conference (ICSSC), 2023.
P. Comesaña, Pérez-González, F., and Balado, F., Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.PDF icon icip03b.pdf (142.96 KB)
P. Comesaña, Pérez-González, F., and Balado, F., Optimal Data-Hiding Strategies for Games with BER Payoffs, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.File iwdw03.ps (499.03 KB)
P. Comesaña, Pérez-González, F., and Balado, F., Optimal Data-Hiding Strategies for Games with BER Payoffs, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.File iwdw03.ps (499.03 KB)
P. Comesaña and Pérez-González, F., Optimal counterforensics for histogram-based forensics, in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052.PDF icon icassp13.pdf (84.89 KB)File Source code (5.47 MB)
P. Comesaña and Pérez-González, F., The optimal attack to histogram-based forensic detectors is simple(x), in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.PDF icon wifs14.pdf (265.04 KB)
N
A. Malvido, Pérez-González, F., and Cousiño, A., A novel model for the print-and-capture channel in 2D bar codes, in International Workshop on Multimedia Content Representation, Classification and Security, Istambul, Turkey, 2006, vol. 4105, pp. 627-634.
P. Comesaña, Balado, F., and Pérez-González, F., A Novel Interpretation of Content Authentication, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.PDF icon spie07authentication.pdf (179.34 KB)
M. Álvarez-Díaz, Courville, N., Mosquera, C., Liva, G., and Corazza, G. E., Non-Linear Interference Mitigation for Broadband Multimedia Satellite Systems, in International Workshop on Satellite and Space Communications (IWSSC), Salzburg, Austria, 2007.