Export 9 results:
[ Author
Filters: First Letter Of Last Name is F [Clear All Filters]
“EM decoding of Tardos traitor tracing codes”, in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
, “Worst case attacks against binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
, “Estimating the minimal length of Tardos code”, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
, “Solving self-interference issues in a Full-Duplex radio transceiver”, 2nd XoveTIC Conference. A Coruña (Spain), 2019.
xovetic19_fullduplex.pdf (577.96 KB)
, 
“Indoor Image Acquisition and Distribution System”, in International Symposium on Power Line Communications and Its Applications (ISPLC), 2003.
, “A low complexity all-digital DS-SS transceiver for power-line communications”, in International Symposium on Power Line Communications and Its Applications (ISPLC), 2003.
, “Temporal Localization of Non-Static Digital Videos Using the Electrical Network Frequency”, IEEE Signal Processing Letters, vol. 27, p. 5, 2020.
, “On the information leakage quantification of camera fingerprint estimates”, Eurasip Journal on Information Security, vol. 2021, no. 6, p. 18, 2021.
bmc_article.pdf (4.19 MB)
, 
“A comparison of system architectures for intelligent document understanding”, Signal Processing: Image Communication, vol. 9, pp. 1-19, 1996.
,