Export 129 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
B. Mathon, Bas, P., Cayre, F., and Pérez-González, F., Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding, in International Workshop on Information Hiding (IH), Santa Barbara, CA, U.S.A., 2008.
C. Mosquera, Boucheret, M. L., Bousquet, M., Cioni, S., Gappmair, W., Pedone, R., Scalise, S., Skoutaridis, P., and Villanti, M., Digital Satellite Communications, Springer, 2007.
S. Scalise, Castanet, L., Luglio, M., Neri, M., Álvarez-Díaz, M., Bito, J., Bousquet, M., Frigyes, I., Horvath, P., Jahn, A., Krejcarek, M., Lemorton, J., Morosi, S., and Vázquez-Castro, M. A., Digital Satellite Communications, New York: Springer, 2007, p. -.
A. A. Rontogiannis, Álvarez-Díaz, M., Casadei, M., Dalakas, V., Duverdier, A., González-Serrano, F. J., Iubatti, M., Javornik, T., Lapierre, L., Neri, M., and Salmi, P., Digital Satellite Communications, New York: Springer, 2007, p. -.
D. Vázquez-Padín, Fontani, M., Bianchi, T., Comesaña, P., Piva, A., and Barni, M., Detection of video double encoding with GOP size estimation, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156.PDF icon wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
L. Pérez-Freire, Comesaña, P., and Pérez-González, F., Detection in quantization-based watermarking: performance and security issues, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_secur.pdf (401.96 KB)
P. Comesaña, Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.PDF icon wifs12_distinguishability.pdf (265.05 KB)
C
E. Rodríguez-Lois, Vázquez-Padín, D., Pérez-González, F., and Comesaña, P., A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection, in EUSIPCO, Belgrade, Serbia, 2022.PDF icon EUSIPCO22_erodriguez_dvazquez_fperez_pcomesan.pdf (518.97 KB)
A. Artés-Rodríguez, Pérez-González, F., Cid-Sueiro, J., López-Valcarce, R., Mosquera, C., and Pérez-Cruz, F., Comunicaciones Digitales. Pearson - Prentice Hall, 2007.
J. Muñoz, Vales-Alonso, J., Quiñoy-García, F., Costas-Sanz, S., Pillado, M., González-Castaño, F. J., García-Sanchez, M., López-Valcarce, R., and López-Bravo, C., A Cognitive Mobile BTS Solution with Software-Defined Radioelectric Sensing, Sensors, vol. 13, no. 2, pp. 2051-2075, 2013.PDF icon sensors-13-02051.pdf (2.93 MB)
S. Vicini, Alberti, F., Notario, N., Crespo, A., Troncoso-Pastoriza, J. R., and Sanna, A., Co-creating Security-and-Privacy-by-Design Systems, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
R. Elasmi-Ksibi, Cherif, S., López-Valcarce, R., and Besbes, H., Closed-form real single-tone frequency estimator based on a normalized IIR notch filter, Signal Processing, vol. 90, pp. 1905-1915, 2010.PDF icon ieee_version_finale_july_2008.pdf (193.5 KB)
J. F. Schmidt, Costas-Sanz, S., and López-Valcarce, R., Choose Your Subcarriers Wisely: Active Interference Cancellation for Cognitive OFDM, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 4, pp. 615-625, 2013.PDF icon spectrumshaping_final.pdf (3.05 MB)
N. González-Prelcic, Mosquera, C., Degara-Quintela, N., and Currais, A., A Channel Model for the Galician Low Voltage Main Network, in International Symposium on Power Line Communications and Its Applications (ISPLC), Malmo, Sweden, 2001.
M. Chowdhury, Manolakos, A., Gomez-Cuba, F., Erkip, E., and Goldsmith, A. J., Capacity scaling in noncoherent wideband massive SIMO systems, in IEEE Information Theory Workshop (ITW), 2015.
F. Gomez-Cuba, Chowdhury, M., Manolakos, A., Erkip, E., and Goldsmith, A. J., Capacity scaling in a non-coherent wideband massive SIMO block fading channel, IEEE Transactions on Wireless Communications, vol. 18, pp. 5691–5704, 2019.PDF icon FINAL_VERSION.pdf (2.5 MB)
P. Comesaña and Pérez-González, F., On the capacity of stegosystems, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.PDF icon acm07stego.pdf (198.41 KB)
B
P. Comesaña and Pérez-González, F., Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol. 2007, 2007.PDF icon jis07bows.pdf (436.69 KB)File Source code available here. (8.51 MB)
J. R. Troncoso-Pastoriza and Caputo, S., Bootstrap-based Proxy Reencryption for Private Multi-user Computing, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.PDF icon TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The blind Newton senstivity attack, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.File spie06_sensitivity.ps (1.62 MB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.File iee-06bnsa.ps (1.67 MB)
F. Balado, Pérez-González, F., and Comesaña, P., Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.PDF icon spie04em.pdf (434.03 KB)
J. F. Schmidt, Cousseau, J. E., Wichman, R., and Werner, S., Bit Loading Using Imperfect CSIT for Prediction-Based Resource Allocation in Mobile OFDMA, Vehicular Technology, IEEE Transactions on, vol. 60, pp. 4082 -4088, 2011.
A
P. Comesaña, Merhav, N., and Barni, M., Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.PDF icon tit-2010.pdf (240.81 KB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.PDF icon spie08one-bit-wm.pdf (277.85 KB)