Export 129 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Journal Article
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.File iee-06bnsa.ps (1.67 MB)
P. Comesaña and Pérez-González, F., Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol. 2007, 2007.PDF icon jis07bows.pdf (436.69 KB)File Source code available here. (8.51 MB)
F. Gomez-Cuba, Chowdhury, M., Manolakos, A., Erkip, E., and Goldsmith, A. J., Capacity scaling in a non-coherent wideband massive SIMO block fading channel, IEEE Transactions on Wireless Communications, vol. 18, pp. 5691–5704, 2019.PDF icon FINAL_VERSION.pdf (2.5 MB)
J. F. Schmidt, Costas-Sanz, S., and López-Valcarce, R., Choose Your Subcarriers Wisely: Active Interference Cancellation for Cognitive OFDM, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 4, pp. 615-625, 2013.PDF icon spectrumshaping_final.pdf (3.05 MB)
R. Elasmi-Ksibi, Cherif, S., López-Valcarce, R., and Besbes, H., Closed-form real single-tone frequency estimator based on a normalized IIR notch filter, Signal Processing, vol. 90, pp. 1905-1915, 2010.PDF icon ieee_version_finale_july_2008.pdf (193.5 KB)
J. Muñoz, Vales-Alonso, J., Quiñoy-García, F., Costas-Sanz, S., Pillado, M., González-Castaño, F. J., García-Sanchez, M., López-Valcarce, R., and López-Bravo, C., A Cognitive Mobile BTS Solution with Software-Defined Radioelectric Sensing, Sensors, vol. 13, no. 2, pp. 2051-2075, 2013.PDF icon sensors-13-02051.pdf (2.93 MB)
P. Comesaña, Pérez-González, F., and Balado, F., On distortion-compensated Dither Modulation data-hiding with repetition coding, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006.PDF icon dcdm_uvigo05.pdf (311.95 KB)
V. Conotter, Comesaña, P., and Pérez-González, F., Forensic detection of processing operator chains: recovering the history of filtered JPEG images, IEEE Transactions on Information Forensics and Security, 2015.PDF icon tifs.pdf (2.46 MB)
V. Conotter, Comesaña, P., and Pérez-González, F., Forensic detection of processing operator chains: recovering the history of filtered JPEG images, IEEE Transactions on Information Forensics and Security, 2015.PDF icon tifs.pdf (2.46 MB)
R. Elasmi-Ksibi, Besbes, H., López-Valcarce, R., and Cherif, S., Frequency estimation of real-valued single-tone in colored noise using multiple autocorrelation lags, Signal Processing, vol. 90, pp. 2303-2307, 2010.PDF icon colored_noise_letter.pdf (111 KB)
P. Comesaña and Pérez-González, F., The impact of the cropping attack on scalar STDM data hiding, IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006.File ieee-spl06_cropping.ps (243.75 KB)
M. Barni, Campisi, P., Delp, E. J., Doërr, G., Fridrich, J., Memon, N., Pérez-González, F., Rocha, A., Verdoliva, L., and Wu, M., Information Forensics and Security: A quarter-century-long journey, IEEE Signal Processing Magazine, vol. 40, pp. 67-79, 2023.
B. E. Salem, Cherif, S., Besbes, H., and López-Valcarce, R., Lattice implementation of adaptive channel shortening in multicarrier transmission over IIR channels, EURASIP Journal on Advances in Signal Processing, vol. 2013:174, 2013.
B. Shebaro, Pérez-González, F., and Crandall, J. R., Leaving Timing Channel Fingerprints in Hidden Service Log Files, Digital Investigation, 2010.
A. Tato, Andrenacci, S., Lagunas, E., Chatzinotas, S., and Mosquera, C., Link Adaptation and SINR errors in Practical Multicast Multibeam Satellite Systems with Linear Precoding, International Journal of Satellite Communications and Networking, 2020.PDF icon IJSCN-2020-precoding-nullification.pdf (1.42 MB)
J. F. Schmidt, Cousseau, J. E., Wichman, R., and Werner, S., Low-Complexity Channel Prediction Using Approximated Recursive DCT, Circuits and Systems I: Regular Papers, IEEE Transactions on, vol. 58, pp. 2520 -2530, 2011.
D. Christopoulos, Arnau, J., Chatzinotas, S., Mosquera, C., and Ottersten, B., MMSE Performance Analysis of Generalized Multibeam Satellite Channels, Communications Letters, IEEE, pp. 1-4, 2013.PDF icon 1211.5903v1.pdf (192.05 KB)
D. Christopoulos, Arnau, J., Chatzinotas, S., Mosquera, C., and Ottersten, B., MMSE Performance Analysis of Generalized Multibeam Satellite Channels, Communications Letters, IEEE, pp. 1-4, 2013.PDF icon 1211.5903v1.pdf (192.05 KB)
G. Domínguez-Conde, Comesaña, P., and Pérez-González, F., Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009.PDF icon tifs09performanceanalysis.pdf (232.67 KB)
J. Arnau, Christopoulos, D., Chatzinotas, S., Mosquera, C., and Ottersten, B., Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation, IEEE Transactions on Wireless Communications, pp. 1-1, 2014.PDF icon multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
J. Arnau, Christopoulos, D., Chatzinotas, S., Mosquera, C., and Ottersten, B., Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation, IEEE Transactions on Wireless Communications, pp. 1-1, 2014.PDF icon multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
D. Vázquez-Padín, Pérez-González, F., and Comesaña, P., A Random Matrix Approach to the Forensic Analysis of Upscaled Images, IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115-2130, 2017.PDF icon TIFS17_resampling.pdf (1.04 MB)
E. R. Yeh, Choi, J., González-Prelcic, N., Bhat, C., and Heath, Jr., R. W., Security in automotive radar and vehicular networks, Microwave Journal, 2016.
L. Pérez-Freire, Pérez-González, F., Furon, T., and Comesaña, P., Security of lattice-based data hiding against the Known Message Attack, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.PDF icon tifs06security.pdf (563.51 KB)
B. Tondi, Comesaña, P., Pérez-González, F., and Barni, M., Smart Detection of Line-Search Oracle Attacks, IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 588-603, 2017.PDF icon TIFS_smartOracle.pdf (3.73 MB)