Export 78 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is B [Clear All Filters]
“On the analysis of scheduling in dynamic duplex multi-hop mmWave cellular systems”, IEEE Transactions on Wireless Communications, vol. 14, pp. 6028 – 6042, 2015. mmWaveScheduling.pdf (801.38 KB)
, “Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications”, Signal Processing, vol. 81, pp. 1215–1238, 2001.
, “ArboX, a Contribution to Digital Library”, in International Conference on Engineering and Computer Education (ICECE), Rio de Janeiro, Brazil, 1999.
, “ArboX, a Contribution to Digital Library”, Computer Applications in Engineering Education, vol. 8, pp. 216–220, 2000.
, “Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014. spie14_2.0.pdf (430.73 KB)
, “Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819. spie08one-bit-wm.pdf (277.85 KB)
, “Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime”, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010. tit-2010.pdf (240.81 KB)
, “A Benford-Fourier JPEG compression detector”, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014. benford_icip_rice_new.pdf (235.58 KB)
, “Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815. spie04em.pdf (434.03 KB)
, “Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, “Closed-form real single-tone frequency estimator based on a normalized IIR notch filter”, Signal Processing, vol. 90, pp. 1905-1915, 2010. ieee_version_finale_july_2008.pdf (193.5 KB)
, “Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes”, in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
, “Coping with the enemy: Advances in adversary-aware signal processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, 2013, pp. 8682–8686.
, “Data Hiding Robust to Mobile Communication Vocoders”, IEEE Transactions on Multimedia, vol. 18, no. 12, pp. 2345-2357, 2016. TMM2599149.pdf (3.04 MB)
, “Design of projection matrices for PRNU compression”, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6. 2017_prnu_projection.pdf (689.14 KB)
, “Design of projection matrices for PRNU compression”, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6. 2017_prnu_projection.pdf (689.14 KB)
, “Detection of video double encoding with GOP size estimation”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156. wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, “Detection of video double encoding with GOP size estimation”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156. wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, “Digital image data hiding using side information”, University of Vigo, Spain, 2003.
, “Digital Satellite Communications”, Springer, 2007.
, “Digital Satellite Communications”, Springer, 2007.
, “Digital Satellite Communications”, New York: Springer, 2007, p. -.
, “Digital Satellite Communications”, New York: Springer, 2007, p. -.
, “On Distortion Measures Associated to Random Desynchronization Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding”, in International Workshop on Information Hiding (IH), Santa Barbara, CA, U.S.A., 2008.
,