Export 125 results:
Author Title [ Type
Filters: First Letter Of Last Name is C [Clear All Filters]
Comunicaciones Digitales. Pearson - Prentice Hall, 2007.
, “Digital Satellite Communications”, New York: Springer, 2007, p. -.
, “Digital Satellite Communications”, New York: Springer, 2007, p. -.
, “Digital Satellite Communications”, Springer, 2007.
, “Adjacent Beams Resource Sharing to Serve Hot Spots : A Rate Splitting Approach”, in 36th International Communications Satellite Systems Conference (ICSSC), Niagara Falls, Canada, 2018.
ADJACENT_BEAMS_RESOURCE_SHARING_TO_SERVE_HOT_SPOTS_A_RATE_SPLITTING_APPROACH.pdf (756.71 KB)
, 
“Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
“Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
“Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.
spie08one-bit-wm.pdf (277.85 KB)
, 
“Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.
spie04em.pdf (434.03 KB)
, 
“The blind Newton senstivity attack”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sensitivity.ps (1.62 MB)
, 
“Bootstrap-based Proxy Reencryption for Private Multi-user Computing”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, 
“On the capacity of stegosystems”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.
acm07stego.pdf (198.41 KB)
, 
“Capacity scaling in noncoherent wideband massive SIMO systems”, in IEEE Information Theory Workshop (ITW), 2015.
, “A Channel Model for the Galician Low Voltage Main Network”, in International Symposium on Power Line Communications and Its Applications (ISPLC), Malmo, Sweden, 2001.
, “Co-creating Security-and-Privacy-by-Design Systems”, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, “A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection”, in EUSIPCO, Belgrade, Serbia, 2022.
EUSIPCO22_erodriguez_dvazquez_fperez_pcomesan.pdf (518.97 KB)
, 
“Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains”, in IEEE Workshop on Information Forensics and Security, Tenerife, Spain, 2012.
wifs12_distinguishability.pdf (265.05 KB)
, 
“Detection in quantization-based watermarking: performance and security issues”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_secur.pdf (401.96 KB)
, 
“Detection of video double encoding with GOP size estimation”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156.
wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, 
“Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding”, in International Workshop on Information Hiding (IH), Santa Barbara, CA, U.S.A., 2008.
, “Dither modulation in the logarithmic domain”, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.
iwdw07.pdf (183.38 KB)
, 
“Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.
icip03a.pdf (145.04 KB)
, 
“DVB-S Air Interface over Railroad Satellite Channel: Performance and Extensions”, in Baiona Workshop on Signal Processing in Communications, Baiona, Spain, 2003.
, “Estimating the minimal length of Tardos code”, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
, “Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems”, in 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 2018.
exploratory-analysis-superposition.pdf (288.42 KB)
, 