Primary tabs
“Digital Satellite Communications”, New York: Springer, 2007, p. -.
, “Digital Satellite Communications”, Springer, 2007.
, “Disclosing secrets in watermarking and data hiding”, in Third Wavila Challenge (WaCha), Saint-Malo, France, 2007.
, “On Distortion Measures Associated to Random Desynchronization Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Dither modulation in the logarithmic domain”, in International Workshop on Digital Watermarking (IWDW), Guangzhou, China, 2007, pp. 1261-1264.
iwdw07.pdf (183.38 KB)
, ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
“Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks”, EURASIP Journal on Information Security, 2007.
, “Exploiting security holes in lattice data hiding”, in International Workshop on Information Hiding (IH), Saint-Malo, France, 2007.
, “A Generalization of Benford's Law and Its Application to Images”, in European Control Conference (ECC), Kos, Greece, 2007.
, “Iterative Envelope-Based SNR Estimation for Non-Constant Modulus Constellations”, in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2007.
, “Modeling Gabor coefficients via Generalized Gaussian Distributions for face recognition”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
gonzalezjimenez_camera_ready.pdf (339.33 KB)
, ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
“Non-Linear Interference Mitigation for Broadband Multimedia Satellite Systems”, in International Workshop on Satellite and Space Communications (IWSSC), Salzburg, Austria, 2007.
, “A Novel Interpretation of Content Authentication”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07authentication.pdf (179.34 KB)
, ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
“Practical estimators of the secret spreading vector for Improved Spread Spectrum modulations. Statistical analysis and results”. Signal Theory and Communications Department, University of Vigo, Spain, 2007.
, “Privacy Preserving Error Resilient DNA Searching through Oblivious Automata”, in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
, “Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Honolulu, HW, USA, 2007, vol. 4, pp. 1261-1264.
icassp07reproducible.pdf (67.03 KB)
, ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
“Satellite Communications: Research Trends and Open Issues”, in International Workshop on Satellite and Space Communications (IWSSC), 2007.
, “A Secure Multidimensional Point Inclusion Protocol”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, “Security of Spread-Spectrum-Based Data Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation”, IEEE Communications Letters, vol. 11, pp. 351-353, 2007.
lopezvalcarce_CL2006-1948.pdf (195.93 KB)
, ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
“Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
, “Two different approaches for attacking BOWS”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
spie07bows.pdf (416.45 KB)
, ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
“On a watermarking scheme in the logarithmic domain and its perceptual advantages”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
icip07logwat.pdf (77.03 KB)
, ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
“An accurate analysis of scalar quantization-based data-hiding”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 80-86, 2006.
, “On achievable security levels for lattice data hiding in the Known Message Attack scenario”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
,