“Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014. spie14_2.0.pdf (430.73 KB)
, “Information Forensics and Security: A quarter-century-long journey”, IEEE Signal Processing Magazine, vol. 40, pp. 67-79, 2023.
, “DNN Watermarking: Four Challenges and a Funeral”, in 2021 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC'21, Virtual Event Belgium, 2021, pp. 189-196. ihmm13-barniA.pdf (515.94 KB)
, “Coping with the enemy: Advances in adversary-aware signal processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, 2013, pp. 8682–8686.
, “Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE”, in International Conference on Security and Cryptography for Networks (SCN), 2020. BEPST20-SCN20.pdf (457.81 KB)
, “Efficient protocols for oblivious linear function evaluation from ring-LWE”, Journal of Computer Security, vol. 30, no. 1, p. 40, 2022.
, “Near optimal detection of quantized signals and application to JPEG forensics”, 2013 IEEE International Workshop on Information Forensics and Security (WIFS). Guangzhou, China, pp. 168-173, 2013. wifs13_bianchi.pdf (293.74 KB)
, “Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
, “Improving PRNU Compression Through Preprocessing, Quantization, and Coding”, IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, p. 13, 2019. 2018_prnu_resize_deadzone.pdf (3.81 MB)
, “Design of projection matrices for PRNU compression”, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6. 2017_prnu_projection.pdf (689.14 KB)
, “Subspace Leakage in Conventional and Dimensionally Spread Null-Space Communications”, IEEE Communications Letters, vol. 27, no. 10, p. 5, 2023.
, “Energy-efficient analog beamforming with short packets in millimeter-wave MIMO systems”, in 2020 54th Asilomar Conference on Signals, Systems, and Computers, California, 2020, Virtual event, 2020. Asilomar2020.pdf (353.1 KB)
, “Array Geometry-Invariant Space-Time Opportunistic Null-Space Communications”, IEEE Access, vol. 12, p. 14, 2024.
, “Testing a Flexible Time-Frequency Mapping for High Frequencies in TARCO (Tonal Adaptive Resolution COdec)”, in Audio Engineering Society Convention (AES Convention), Amsterdam, The Netherlands, 1998.
, “Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems”, in 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 2018. exploratory-analysis-superposition.pdf (288.42 KB)
, “Capacity scaling in noncoherent wideband massive SIMO systems”, in IEEE Information Theory Workshop (ITW), 2015.
, “MMSE Performance Analysis of Generalized Multibeam Satellite Channels”, Communications Letters, IEEE, pp. 1-4, 2013. 1211.5903v1.pdf (192.05 KB)
, “Side-informed data hiding: robustness and security analysis”, University of Vigo, Spain, 2006. thesis_pedro.pdf (2.18 MB)
, “Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819. spie08one-bit-wm.pdf (277.85 KB)
, “Quantization lattice estimation for multimedia forensics”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456. icip13.pdf (88.9 KB)
, “The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274. iwdw05.pdf (190.47 KB)
, “Witsenhausen's counterexample and its links with multimedia security problems”, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011. iwdw11_witsenhausen.pdf (152.97 KB)
, “Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601. spie04.ps (572.73 KB)
, “Blind Newton Sensitivity Attack”, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
, “Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks”, EURASIP Journal on Information Security, vol. 2007, 2007. jis07bows.pdf (436.69 KB) Source code available here. (8.51 MB)
,