Export 125 results:
Author [ Title
Filters: First Letter Of Last Name is C [Clear All Filters]
“Non-coherent rate-splitting for multibeam satellite forward link: practical coding and decoding algorithms”, in IEEE 91st Vehicular Technology Conference (VTC2020-Spring), 25-28 May 2020, virtual event., 2020.
NCR_VTC2020.pdf (556.42 KB)
, 
“Non-Linear Interference Mitigation for Broadband Multimedia Satellite Systems”, in International Workshop on Satellite and Space Communications (IWSSC), Salzburg, Austria, 2007.
, “Non-Linear Interference Mitigation for Broadband Multimedia Satellite Systems”, in International Workshop on Satellite and Space Communications (IWSSC), Salzburg, Austria, 2007.
, “A Novel Interpretation of Content Authentication”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07authentication.pdf (179.34 KB)
, 
“A novel model for the print-and-capture channel in 2D bar codes”, in International Workshop on Multimedia Content Representation, Classification and Security, Istambul, Turkey, 2006, vol. 4105, pp. 627-634.
, “The optimal attack to histogram-based forensic detectors is simple(x)”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.
wifs14.pdf (265.04 KB)
, 
“Optimal counterforensics for histogram-based forensics”, in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052.
icassp13.pdf (84.89 KB)
Source code (5.47 MB)
, 

“Optimal Data-Hiding Strategies for Games with BER Payoffs”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.
iwdw03.ps (499.03 KB)
, 
“Optimal Data-Hiding Strategies for Games with BER Payoffs”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.
iwdw03.ps (499.03 KB)
, 
“Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.
icip03b.pdf (142.96 KB)
, 
“Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.
tifs09performanceanalysis.pdf (232.67 KB)
, 
“Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
icip09domcomper.pdf (129.76 KB)
, 
“Performance of DVB-S Air-Interface over Land Mobile Satellite Channel at Ku-Band for Fast Trains”, in International Workshop on Signal Processing for Space Communications (SPSC), Catania, Italia, 2003.
, “Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation”, IEEE Transactions on Wireless Communications, pp. 1-1, 2014.
multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
, 
“Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation”, IEEE Transactions on Wireless Communications, pp. 1-1, 2014.
multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
, 
“Prediction based resource allocation in OFDMA”, in Information Sciences and Systems (CISS), 2011 45th Annual Conference on, 2011, pp. 1 -4.
, “Privacy Preserving Error Resilient DNA Searching through Oblivious Automata”, in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
, “Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.
icassp07reproducible.pdf (67.03 KB)
, 
“Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.
spie04.ps (572.73 KB)
, 
“Quantization lattice estimation for multimedia forensics”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.
icip13.pdf (88.9 KB)
, 
“A Random Matrix Approach to the Forensic Analysis of Upscaled Images”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115-2130, 2017.
TIFS17_resampling.pdf (1.04 MB)
, 
“Random Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling”, in International Tyrrhenian Workshop on Digital Communication 2017, Palermo, Italy, 2017, pp. 109-124.
TIWDC17_dvazquez_fperez_pcomesan.pdf (394.61 KB)
, 
“The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.
iwdw05.pdf (190.47 KB)
, 
“The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.
iwdw05.pdf (190.47 KB)
, 
“On reversibility of random binning techniques: multimedia perspectives”, in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005.
cms05.pdf (267.92 KB)
, 