|Fernando Pérez-González||Adversarial Signal Processing||Contact Forum Coding Theory and Cryptography Talks: VI, The Royal Flemish Academy of Belgium for Science and the Arts, Brussels, Belgium.||Friday, October 2, 2015||
The aim of this talk is to present the basic theory of adversarial signal processing, with motivating examples taken from the fields of watermarking, multimedia forensics, traffic analysis, intrusion detection, biometrics, cognitive radio, etc. We will focus on adversarial hypothesis testing, which is arguably the best understood topic. As a fundamental approach we will show how to use game theory to model the available strategies to both defender and adversary.
|Fernando Pérez-González||Media forensics: digging up the invisible||Keynote at 3rd Novel Intelligent and Leading Emerging Sciences Conference NILES2021||Monday, October 25, 2021||
Recent advances in the generation of convincing deep fakes have highlighted a problem that had been brewing for more than a decade as multimedia editing programs became more and more popular: today it is extremely easy to generate digital forgeries, to the point that it has affected the credibility of the media.
|Fernando Pérez-González, Simon Oya||Location Privacy: Threats and Opportunities (Tutorial)||WIFS'18 (Hong Kong)||Monday, December 10, 2018||2018_WIFS_LP_tutorial.pdf|
|Fernando Pérez-González||Grissom in Awe: the CSI Effect and Media Forensics||IEEE-EURASIP Summer School in Signal Processing, Cavalese-Italy||Monday, September 5, 2016||
We have all seen it on TV: by hectically typing on a computer keyboard, the CSI guys are able to enhance a low–quality image up to a point where the perpetrator’s face (including his moles and pimples) is clearly visible. Surely, it is an exaggeration, but it has already created a lot of trouble in court, as the jurors’ expectations from prosecutors have skyrocketed. This is called "The CSI Effect". Paradoxically, Grissom would be shocked to learn the latest advances in multimedia forensics, as there is often a level of analysis that brings about much more than meets his eye.
|Fernando Pérez-González||Location privacy: Where do we stand and where are we going?||Keynote Talk at First EAI International Conference on Security and Privacy in New Computing Environments, Guanzghou, China||Thursday, December 15, 2016||
Over time, users have become accustomed to sharing personal data when they install new apps in their smartphones. Declining to do so, normally aborts the installation process. Sadly, users have convinced themselves that the value of their data is much lower than that of the apps they install, “after all, they have nothing to hide”. And thus, in redefining their business models many companies have touted better services and applications which even come for free, in exchange for some loss of privacy.
|Fernando Pérez-González||A Walk on the Wild Side of Camera Attribution||Keynote at 2020 Multimedia Forensics in the Wild Workshop (Online)||Friday, January 15, 2021||
This talk will be a guided tour to the developments made in camera attribution over the past 15 years of research, starting with images and later embracing video. Camera attribution is mainly based on the photoresponse non-uniformity (PRNU), which is a kind of noise that serves as a fingerprint of the device and is present in most digital sensors.
|Carlos Mosquera Nartallo||Link Adaptation in Mobile Satellite Links: Field Trial Results||Thursday, September 15, 2016||
Description of satellite link deployed to test the communication from an UAV. The transceiver, based on a Software-Defined Radio platform, operated in the S-band.
|Carlos Mosquera Nartallo||On the Role of Link Adaptation in Next Generation Multiple Access||NGMA Workshop for the ESA group SatNEx V||Wednesday, April 6, 2022||
Organized by Fraunhofer Institute for Integrated Circuits IIS
|Carlos Mosquera Nartallo||Rate-Splitting and Space Communications, a Robust Alliance||https://youtu.be/Mi69V3IKNeE||Tuesday, December 14, 2021||
IEEE ComSoc WTC SIG on Rate Splitting Multiple Access (RSMA)
|Juan Ramón Troncoso Pastoriza||Secure Signal Processing for Outsourced Face Verification||Biométrie, Indexation multimédia et Vie privée, Télécom ParisTech||Tuesday, October 6, 2015||
Face recognition is one of the foremost applications in computer vision, but faces are inherently sensitive signals that comprise personal identifiable information. Therefore, they must be protected not only when they are stored and transferred, but also while they are processed in an untrustworthy outsourced environment. This is one of the goals of Secure Signal Processing (SSP).