Export 129 results:
Author [ Title
Filters: First Letter Of Last Name is C [Clear All Filters]
“Witsenhausen's counterexample and its links with multimedia security problems”, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.
iwdw11_witsenhausen.pdf (152.97 KB)
, 
“Weber's law-based side-informed data hiding”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.
comesanaicassp11.pdf (119.42 KB)
, 
“Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006.
survey06security.pdf (268.87 KB)
, 
“On a watermarking scheme in the logarithmic domain and its perceptual advantages”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
icip07logwat.pdf (77.03 KB)
, 
“Videosurveillance and privacy: covering the two sides of the mirror with DRM”, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.
drm18-troncoso.pdf (417.17 KB)
, 
“Two different approaches for attacking BOWS”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07bows.pdf (416.45 KB)
, 
“Trellis Shaping Techniques for Satellite Telecommunication Systems”, in International Workshop on Satellite and Space Communications (IWSSC), Leganés, Spain, 2006.
, “Transportation-theoretic image counterforensics to first significant digit histogram forensics”, in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014.
cecilia_icassp2014.pdf (390.14 KB)
, 
“Testing a Flexible Time-Frequency Mapping for High Frequencies in TARCO (Tonal Adaptive Resolution COdec)”, in Audio Engineering Society Convention (AES Convention), Amsterdam, The Netherlands, 1998.
, “Technical Report UV-TSC-DVP-19042017: Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling”, University of Vigo, 2017.
UV-TSC-DVP-19042017_techrepTIFS2017.pdf (441.94 KB)
, 
“Taking advantage of source correlation in forensic analysis”, in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164.
mmsp13.pdf (167.27 KB)
, 
“Symbol-Asynchronous Transmission In Multibeam Satellite User Down-Link: Rate Regions For Novel Superposition Coding Schemes”, in 6th IEEE Global Conference on Signal and Information Processing, 2018.
Symbol-Asynchronous_Transmission_In_Multibeam_Satellite_User_Down-Link_Rate_Regions_For_Novel_Superposition_Coding_Schemes.pdf (455.44 KB)
, 
“An SVD Approach to Forensic Image Resampling Detection”, in EUSIPCO, 2015, pp. 2112-2116.
eusipco15_dvazquez_pcomesan_fperez.pdf (169.61 KB)
, 
“Study on the Application of NOMA Techniques for Heterogeneous Satellite Terminals”, in 10th Advanced Satellite Multimedia Systems Conference (ASMS) and 16th Signal Processing for Space Communications Workshop (SPSC), 2020.
Study_on_the_Application_of_NOMA_Techniques_for_Heterogeneous_Satellite_Terminals.pdf (2.21 MB)
, 
“Space-Time Rate Splitting for the MISO BC with Magnitude CSIT”, IEEE Transactions on Communications, 2021.
TCOMM3074519-version-for-posting.pdf (2.8 MB)
, 
“Smart Detection of Line-Search Oracle Attacks”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 588-603, 2017.
TIFS_smartOracle.pdf (3.73 MB)
, 
“Side-informed data hiding: robustness and security analysis”, University of Vigo, Spain, 2006.
thesis_pedro.pdf (2.18 MB)
, 
“Set-Membership Identification of Resampled Signals”, in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013.
wifs13_dvazquez_pcomesan_fperez.pdf (171.35 KB)
, 
“Sensitivity of compressive sensing architectures based on time interleaved analog-to-digital converters to channel mismatches”, in IEEE International New Circuits and Systems Conference (NEWCAS), 2014.
, “Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.
tifs06security.pdf (563.51 KB)
, 
“Security in automotive radar and vehicular networks”, Microwave Journal, 2016.
, “A Secure Multidimensional Point Inclusion Protocol”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, “Secure Direct and Iterative Protocols for Solving Systems of Linear Equations”, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.
secure_sle_speedws09.pdf (193.97 KB)
, 
“Secret dither estimation in lattice-quantization data hiding: a set-membership approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sme.pdf (223.01 KB)
, 
“Satellite Communications: Research Trends and Open Issues”, in International Workshop on Satellite and Space Communications (IWSSC), 2007.
,