Export 129 results:
Author [ Title
Filters: First Letter Of Last Name is C [Clear All Filters]
“Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks”, vol. 22, no. 12, p. 36, 2020.
, “Adjacent Beams Resource Sharing to Serve Hot Spots : A Rate Splitting Approach”, in 36th International Communications Satellite Systems Conference (ICSSC), Niagara Falls, Canada, 2018.
ADJACENT_BEAMS_RESOURCE_SHARING_TO_SERVE_HOT_SPOTS_A_RATE_SPLITTING_APPROACH.pdf (756.71 KB)
, 
“Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
“Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
“Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.
spie08one-bit-wm.pdf (277.85 KB)
, 
“Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime”, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.
tit-2010.pdf (240.81 KB)
, 
“Bit Loading Using Imperfect CSIT for Prediction-Based Resource Allocation in Mobile OFDMA”, Vehicular Technology, IEEE Transactions on, vol. 60, pp. 4082 -4088, 2011.
, “Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.
spie04em.pdf (434.03 KB)
, 
“Blind Newton Sensitivity Attack”, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.
iee-06bnsa.ps (1.67 MB)
, 
“The blind Newton senstivity attack”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sensitivity.ps (1.62 MB)
, 
“Bootstrap-based Proxy Reencryption for Private Multi-user Computing”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, 
“Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks”, EURASIP Journal on Information Security, vol. 2007, 2007.
jis07bows.pdf (436.69 KB)
Source code available here. (8.51 MB)
, 

“On the capacity of stegosystems”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.
acm07stego.pdf (198.41 KB)
, 
“Capacity scaling in a non-coherent wideband massive SIMO block fading channel”, IEEE Transactions on Wireless Communications, vol. 18, pp. 5691–5704, 2019.
FINAL_VERSION.pdf (2.5 MB)
, 
“Capacity scaling in noncoherent wideband massive SIMO systems”, in IEEE Information Theory Workshop (ITW), 2015.
, “A Channel Model for the Galician Low Voltage Main Network”, in International Symposium on Power Line Communications and Its Applications (ISPLC), Malmo, Sweden, 2001.
, “Choose Your Subcarriers Wisely: Active Interference Cancellation for Cognitive OFDM”, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 4, pp. 615-625, 2013.
spectrumshaping_final.pdf (3.05 MB)
, 
“Closed-form real single-tone frequency estimator based on a normalized IIR notch filter”, Signal Processing, vol. 90, pp. 1905-1915, 2010.
ieee_version_finale_july_2008.pdf (193.5 KB)
, 
“Co-creating Security-and-Privacy-by-Design Systems”, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, “A Cognitive Mobile BTS Solution with Software-Defined Radioelectric Sensing”, Sensors, vol. 13, no. 2, pp. 2051-2075, 2013.
sensors-13-02051.pdf (2.93 MB)
, 
Comunicaciones Digitales. Pearson - Prentice Hall, 2007.
, “A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection”, in EUSIPCO, Belgrade, Serbia, 2022.
EUSIPCO22_erodriguez_dvazquez_fperez_pcomesan.pdf (518.97 KB)
, 
“Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains”, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.
wifs12_distinguishability.pdf (265.05 KB)
, 
“Detection in quantization-based watermarking: performance and security issues”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_secur.pdf (401.96 KB)
, 
“Detection of video double encoding with GOP size estimation”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156.
wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, 