Primary tabs
“Analysis of non-data-aided magnitude gain estimators”, in International Symposium on Image/Video Communications (ISIVC), Hammamet, Tunisia, 2006.
, “Blind carrier phase estimation for non-equiprobable constellations”, in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2006.
, “Blind Newton Sensitivity Attack”, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
, “The blind Newton senstivity attack”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sensitivity.ps (1.62 MB)
, “On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
, “High-rate quantization data hiding robust to arbitrary linear filtering attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
, “The impact of the cropping attack on scalar STDM data hiding”, IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006. ieee-spl06_cropping.ps (243.75 KB)
, “Improving the performance of RDM watermarking by means of trellis coded quantisation”, IEE Proceedings on Information Security, vol. 153, pp. 107-114, 2006.
, “A novel model for the print-and-capture channel in 2D bar codes”, in International Workshop on Multimedia Content Representation, Classification and Security, Istambul, Turkey, 2006, vol. 4105, pp. 627-634.
, “Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, Signal Processing, vol. 86, pp. 1076-1088, 2006.
, “Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation”, International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006.
, “Secret dither estimation in lattice-quantization data hiding: a set-membership approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, “Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, “Side-informed data hiding: robustness and security analysis”, University of Vigo, Spain, 2006. thesis_pedro.pdf (2.18 MB)
, “Symbol-Rate Estimation for DVB-S2 Broadcasting”, in International Workshop on Signal Processing for Space Communications (SPSC), 2006.
, “Toward a theory of multirate nonlinear systems”, in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2006.
, “Trellis Shaping Techniques for Satellite Telecommunication Systems”, in International Workshop on Satellite and Space Communications (IWSSC), Leganés, Spain, 2006.
, “Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB)
, “Zero-Knowledge watermark detector robust to sensitivity attacks”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
, “Aeronautical Channel Model for Broadband L-Band Satellite Communication”, in AIAA International Communications Satellite Systems Conference (ICSSC), Rome, Italy, 2005.
, “Analysis of a first-order adaptive recursive predictor”, in IEEE Conference on Decision and Control / European Control Conference (CDC/ECC), Seville, Spain, 2005. valcarce_cdc05.pdf (1.17 MB)
, “Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_dpc.pdf (165.56 KB)
, “Detection in quantization-based watermarking: performance and security issues”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601. spie05_secur.pdf (401.96 KB)
, “Diamond contour-based phase recovery for (cross-)QAM constellations”, in IEEE Workshop on Statistical Signal Processing (SSP), Bordeaux, France, 2005. ssp05_full.pdf (347.8 KB)
, “Ensuring Gain Invariance in High-Rate Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
,