Export 612 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
M. Barni, Comesaña, P., Pérez-González, F., and Tondi, B., Are you threatening me? Towards smart detectors in watermarking, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.PDF icon spie14_2.0.pdf (430.73 KB)
M. Barni, Campisi, P., Delp, E. J., Doërr, G., Fridrich, J., Memon, N., Pérez-González, F., Rocha, A., Verdoliva, L., and Wu, M., Information Forensics and Security: A quarter-century-long journey, IEEE Signal Processing Magazine, vol. 40, pp. 67-79, 2023.
M. Barni, Pérez-González, F., and Tondi, B., DNN Watermarking: Four Challenges and a Funeral, in 2021 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC'21, Virtual Event Belgium, 2021, pp. 189-196.PDF icon ihmm13-barniA.pdf (515.94 KB)
M. Barni and Pérez-González, F., Coping with the enemy: Advances in adversary-aware signal processing, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, 2013, pp. 8682–8686.
C. Baum, Escudero, D., Pedrouzo-Ulloa, A., Scholl, P., and Troncoso-Pastoriza, J. R., Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE, in International Conference on Security and Cryptography for Networks (SCN), 2020.PDF icon BEPST20-SCN20.pdf (457.81 KB)
C. Baum, Escudero, D., Pedrouzo-Ulloa, A., Scholl, P., and Troncoso-Pastoriza, J. R., Efficient protocols for oblivious linear function evaluation from ring-LWE, Journal of Computer Security, vol. 30, no. 1, p. 40, 2022.
T. Bianchi, Piva, A., and Pérez-González, F., Near optimal detection of quantized signals and application to JPEG forensics, 2013 IEEE International Workshop on Information Forensics and Security (WIFS). Guangzhou, China, pp. 168-173, 2013.PDF icon wifs13_bianchi.pdf (293.74 KB)
G. Boato, Fontanari, C., Natale, D. F. G. B., and Pérez-González, F., Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
L. Bondi, Bestagini, P., Pérez-González, F., and Tubaro, S., Improving PRNU Compression Through Preprocessing, Quantization, and Coding, IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, p. 13, 2019.PDF icon 2018_prnu_resize_deadzone.pdf (3.81 MB)
L. Bondi, Pérez-González, F., Bestagini, P., and Tubaro, S., Design of projection matrices for PRNU compression, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.PDF icon 2017_prnu_projection.pdf (689.14 KB)
J. Borràs and Vazquez, G., Subspace Leakage in Conventional and Dimensionally Spread Null-Space Communications, IEEE Communications Letters, vol. 27, no. 10, p. 5, 2023.
J. Borràs, Molina, F., López-Valcarce, R., and Sala, J., Energy-efficient analog beamforming with short packets in millimeter-wave MIMO systems, in 2020 54th Asilomar Conference on Signals, Systems, and Computers, California, 2020, Virtual event, 2020.PDF icon Asilomar2020.pdf (353.1 KB)
J. Borràs and Vazquez, G., Array Geometry-Invariant Space-Time Opportunistic Null-Space Communications, IEEE Access, vol. 12, p. 14, 2024.
C
A. Casal, Serantes, C., González-Prelcic, N., and Pena, A. S., Testing a Flexible Time-Frequency Mapping for High Frequencies in TARCO (Tonal Adaptive Resolution COdec), in Audio Engineering Society Convention (AES Convention), Amsterdam, The Netherlands, 1998.
M. Caus, Pastore, A., Navarro, M., Ramírez, T., Mosquera, C., Noels, N., Alagha, N., and Perez-Neira, A. I., Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems, in 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 2018.PDF icon exploratory-analysis-superposition.pdf (288.42 KB)
M. Chowdhury, Manolakos, A., Gomez-Cuba, F., Erkip, E., and Goldsmith, A. J., Capacity scaling in noncoherent wideband massive SIMO systems, in IEEE Information Theory Workshop (ITW), 2015.
D. Christopoulos, Arnau, J., Chatzinotas, S., Mosquera, C., and Ottersten, B., MMSE Performance Analysis of Generalized Multibeam Satellite Channels, Communications Letters, IEEE, pp. 1-4, 2013.PDF icon 1211.5903v1.pdf (192.05 KB)
P. Comesaña, Side-informed data hiding: robustness and security analysis, University of Vigo, Spain, 2006.PDF icon thesis_pedro.pdf (2.18 MB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.PDF icon spie08one-bit-wm.pdf (277.85 KB)
P. Comesaña, Pérez-González, F., and Liste, N., Quantization lattice estimation for multimedia forensics, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.PDF icon icip13.pdf (88.9 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The return of the sensitivity attack, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.PDF icon iwdw05.pdf (190.47 KB)
P. Comesaña, Pérez-González, F., and Abdallah, C. T., Witsenhausen's counterexample and its links with multimedia security problems, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.PDF icon iwdw11_witsenhausen.pdf (152.97 KB)
P. Comesaña and Pérez-González, F., Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.File spie04.ps (572.73 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.File iee-06bnsa.ps (1.67 MB)
P. Comesaña and Pérez-González, F., Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol. 2007, 2007.PDF icon jis07bows.pdf (436.69 KB)File Source code available here. (8.51 MB)